Analysis
-
max time kernel
133s -
max time network
135s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
11-11-2020 11:11
Static task
static1
Behavioral task
behavioral1
Sample
1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe
Resource
win10v20201028
General
-
Target
1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe
-
Size
270KB
-
MD5
fe3e59ba0fd4cfa9438a2d95a629d4a5
-
SHA1
928ed756321f9fedb5c013f0d9a64ffc234fa620
-
SHA256
1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4
-
SHA512
f1bfa9d4a793ce3d73ed44206442dab598f9ebdf4a9a3d9f993ef37f4b824be2d0a7430507a061be525e5b525e1656871b0562088a5fa8ab25961d48c63e6c9d
Malware Config
Extracted
C:\Users\Admin\Music\# DECRYPT MY FILES #.txt
cerber
http://bqyjebfh25oellur.onion.to/FECA-C80C-1098-0072-8B8F
http://bqyjebfh25oellur.onion.cab/FECA-C80C-1098-0072-8B8F
http://bqyjebfh25oellur.onion.nu/FECA-C80C-1098-0072-8B8F
http://bqyjebfh25oellur.onion.link/FECA-C80C-1098-0072-8B8F
http://bqyjebfh25oellur.tor2web.org/FECA-C80C-1098-0072-8B8F
http://bqyjebfh25oellur.onion/FECA-C80C-1098-0072-8B8F
Extracted
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html
http://bqyjebfh25oellur.onion.to/FECA-C80C-1098-0072-8B8F(Get
http://bqyjebfh25oellur.onion.cab/FECA-C80C-1098-0072-8B8F
http://bqyjebfh25oellur.onion.nu/FECA-C80C-1098-0072-8B8F
http://bqyjebfh25oellur.onion.link/FECA-C80C-1098-0072-8B8F
http://bqyjebfh25oellur.tor2web.org/FECA-C80C-1098-0072-8B8F
http://bqyjebfh25oellur.onion.to/FECA-C80C-1098-0072-8B8F);
http://bqyjebfh25oellur.onion.to/FECA-C80C-1098-0072-8B8F
http://bqyjebfh25oellur.onion/FECA-C80C-1098-0072-8B8F
Signatures
-
Cerber
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
-
Ursnif RM3
A heavily modified version of Ursnif discovered in the wild.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exektmutil.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\ktmutil.exe\"" 1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\ktmutil.exe\"" ktmutil.exe -
Executes dropped EXE 2 IoCs
Processes:
ktmutil.exektmutil.exepid process 1444 ktmutil.exe 1736 ktmutil.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1812 cmd.exe -
Drops startup file 2 IoCs
Processes:
1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exektmutil.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\ktmutil.lnk 1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\ktmutil.lnk ktmutil.exe -
Loads dropped DLL 2 IoCs
Processes:
1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exektmutil.exepid process 784 1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe 1444 ktmutil.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
ktmutil.exe1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run ktmutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ktmutil = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\ktmutil.exe\"" ktmutil.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce ktmutil.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ktmutil = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\ktmutil.exe\"" ktmutil.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run 1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\ktmutil = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\ktmutil.exe\"" 1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ktmutil = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\ktmutil.exe\"" 1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe -
Processes:
ktmutil.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ktmutil.exe -
JavaScript code in executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html js -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 ip-api.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
ktmutil.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpFBA.bmp" ktmutil.exe -
Drops file in Program Files directory 15 IoCs
Processes:
ktmutil.exedescription ioc process File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.vbs ktmutil.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\ACADEMIC.ONE ktmutil.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.html ktmutil.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.txt ktmutil.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.txt ktmutil.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.html ktmutil.exe File created C:\Program Files (x86)\Microsoft Office\Office14\OneNote\# DECRYPT MY FILES #.url ktmutil.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.url ktmutil.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BUSINESS.ONE ktmutil.exe File created C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\# DECRYPT MY FILES #.vbs ktmutil.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\DESIGNER.ONE ktmutil.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\BLANK.ONE ktmutil.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\ONENOTE\14\Stationery\PLANNERS.ONE ktmutil.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendToOneNote-PipelineConfig.xml ktmutil.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OneNote\SendToOneNote.ini ktmutil.exe -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 1760 taskkill.exe 2180 taskkill.exe -
Modifies Control Panel 4 IoCs
Processes:
ktmutil.exe1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\ktmutil.exe\"" ktmutil.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop 1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop\SCRNSAVE.EXE = "\"C:\\Users\\Admin\\AppData\\Roaming\\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\\ktmutil.exe\"" 1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Control Panel\Desktop ktmutil.exe -
Processes:
iexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 905e6e3622b8d601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "311860982" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039e08b06c84715459283081ff7bb5a600000000002000000000010660000000100002000000071d6cf1e4f3fe2d12229a1856ca399a872d8e4ebc54705113e4654baa6c21f73000000000e80000000020000200000003ac8e218c18bb20c20a5a0153641774435108ba51e2cc4c2d7771889a9506bcc20000000170dbbff893dfeb76320207bb138aa3e17ffea6cb1d2e9c766e4949483e7146d400000003126ff34b0fa81e8a1fcea953a39af61eebd71a520711cab59c73620f10089f6e29b12e6f2ae3217de979f93e0a010ccd81a841a9b5191899084c9585f9b2418 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039e08b06c84715459283081ff7bb5a6000000000020000000000106600000001000020000000d02358e9b87a0171c65a19617cfce3fb462ace1795ddc754d4d02b3228c45c22000000000e800000000200002000000042d4fe7bf6747a4c40a22ece96e3b70e914be46c9e4434169172432d43dd8f5e90000000806859d6b3003920dd1fb92583161a461cbf3ba59f82effa93677c0f085dca744999c1646466ea3a2bc894f2479d7602ddf1a58dc560bf26dc234d432e23af3749a1b9837dc8cb89ef03767be5968b6b52403040af49d87e08fbcf9d6038a8d0a90c64939705b785746d690acef0c6e9b3f7fe9bb17d2aa2db745e08c081ba497e042a21566f34927d188e9e60ce1af04000000024aba0331ebdcd51e3243a1d9230c09bf6eed0ba08a9a6fb775aa53acbb47c06e21a381dd3e9791cd0483e2d78298b7b218349a9563d419f002df0258d1a7e2a iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{712B30E1-2415-11EB-A309-520DDC0DB10A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7161F081-2415-11EB-A309-520DDC0DB10A} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 240 IoCs
Processes:
ktmutil.exepid process 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe 1444 ktmutil.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exetaskkill.exektmutil.exektmutil.exeAUDIODG.EXEtaskkill.exedescription pid process Token: SeDebugPrivilege 784 1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe Token: SeDebugPrivilege 1760 taskkill.exe Token: SeDebugPrivilege 1444 ktmutil.exe Token: SeDebugPrivilege 1736 ktmutil.exe Token: 33 1952 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1952 AUDIODG.EXE Token: 33 1952 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1952 AUDIODG.EXE Token: SeDebugPrivilege 2180 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
iexplore.exeiexplore.exepid process 1764 iexplore.exe 2004 iexplore.exe 1764 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
iexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEpid process 1764 iexplore.exe 1764 iexplore.exe 1764 iexplore.exe 1764 iexplore.exe 2004 iexplore.exe 2004 iexplore.exe 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE 1476 IEXPLORE.EXE 1476 IEXPLORE.EXE 1424 IEXPLORE.EXE 1424 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 3 IoCs
Processes:
1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exektmutil.exektmutil.exepid process 784 1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe 1444 ktmutil.exe 1736 ktmutil.exe -
Suspicious use of WriteProcessMemory 50 IoCs
Processes:
1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.execmd.exetaskeng.exektmutil.exeiexplore.exeiexplore.execmd.exedescription pid process target process PID 784 wrote to memory of 1444 784 1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe ktmutil.exe PID 784 wrote to memory of 1444 784 1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe ktmutil.exe PID 784 wrote to memory of 1444 784 1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe ktmutil.exe PID 784 wrote to memory of 1444 784 1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe ktmutil.exe PID 784 wrote to memory of 1812 784 1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe cmd.exe PID 784 wrote to memory of 1812 784 1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe cmd.exe PID 784 wrote to memory of 1812 784 1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe cmd.exe PID 784 wrote to memory of 1812 784 1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe cmd.exe PID 1812 wrote to memory of 1760 1812 cmd.exe taskkill.exe PID 1812 wrote to memory of 1760 1812 cmd.exe taskkill.exe PID 1812 wrote to memory of 1760 1812 cmd.exe taskkill.exe PID 1812 wrote to memory of 1760 1812 cmd.exe taskkill.exe PID 1812 wrote to memory of 616 1812 cmd.exe PING.EXE PID 1812 wrote to memory of 616 1812 cmd.exe PING.EXE PID 1812 wrote to memory of 616 1812 cmd.exe PING.EXE PID 1812 wrote to memory of 616 1812 cmd.exe PING.EXE PID 1716 wrote to memory of 1736 1716 taskeng.exe ktmutil.exe PID 1716 wrote to memory of 1736 1716 taskeng.exe ktmutil.exe PID 1716 wrote to memory of 1736 1716 taskeng.exe ktmutil.exe PID 1716 wrote to memory of 1736 1716 taskeng.exe ktmutil.exe PID 1444 wrote to memory of 1764 1444 ktmutil.exe iexplore.exe PID 1444 wrote to memory of 1764 1444 ktmutil.exe iexplore.exe PID 1444 wrote to memory of 1764 1444 ktmutil.exe iexplore.exe PID 1444 wrote to memory of 1764 1444 ktmutil.exe iexplore.exe PID 1444 wrote to memory of 772 1444 ktmutil.exe NOTEPAD.EXE PID 1444 wrote to memory of 772 1444 ktmutil.exe NOTEPAD.EXE PID 1444 wrote to memory of 772 1444 ktmutil.exe NOTEPAD.EXE PID 1444 wrote to memory of 772 1444 ktmutil.exe NOTEPAD.EXE PID 1764 wrote to memory of 1424 1764 iexplore.exe IEXPLORE.EXE PID 1764 wrote to memory of 1424 1764 iexplore.exe IEXPLORE.EXE PID 1764 wrote to memory of 1424 1764 iexplore.exe IEXPLORE.EXE PID 1764 wrote to memory of 1424 1764 iexplore.exe IEXPLORE.EXE PID 2004 wrote to memory of 1476 2004 iexplore.exe IEXPLORE.EXE PID 2004 wrote to memory of 1476 2004 iexplore.exe IEXPLORE.EXE PID 2004 wrote to memory of 1476 2004 iexplore.exe IEXPLORE.EXE PID 2004 wrote to memory of 1476 2004 iexplore.exe IEXPLORE.EXE PID 1444 wrote to memory of 1928 1444 ktmutil.exe WScript.exe PID 1444 wrote to memory of 1928 1444 ktmutil.exe WScript.exe PID 1444 wrote to memory of 1928 1444 ktmutil.exe WScript.exe PID 1444 wrote to memory of 1928 1444 ktmutil.exe WScript.exe PID 1444 wrote to memory of 2140 1444 ktmutil.exe cmd.exe PID 1444 wrote to memory of 2140 1444 ktmutil.exe cmd.exe PID 1444 wrote to memory of 2140 1444 ktmutil.exe cmd.exe PID 1444 wrote to memory of 2140 1444 ktmutil.exe cmd.exe PID 2140 wrote to memory of 2180 2140 cmd.exe taskkill.exe PID 2140 wrote to memory of 2180 2140 cmd.exe taskkill.exe PID 2140 wrote to memory of 2180 2140 cmd.exe taskkill.exe PID 2140 wrote to memory of 2268 2140 cmd.exe PING.EXE PID 2140 wrote to memory of 2268 2140 cmd.exe PING.EXE PID 2140 wrote to memory of 2268 2140 cmd.exe PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe"C:\Users\Admin\AppData\Local\Temp\1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe"1⤵
- Adds policy Run key to start application
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Modifies Control Panel
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\ktmutil.exe"C:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\ktmutil.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.html3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1764 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txt3⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbs"3⤵
-
C:\Windows\system32\cmd.exe/d /c taskkill /t /f /im "ktmutil.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\ktmutil.exe" > NUL3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /t /f /im "ktmutil.exe"4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\PING.EXEping -n 1 127.0.0.14⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.exe/d /c taskkill /t /f /im "1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe" > NUL & ping -n 1 127.0.0.1 > NUL & del "C:\Users\Admin\AppData\Local\Temp\1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe" > NUL2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /t /f /im "1eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\PING.EXEping -n 1 127.0.0.13⤵
- Runs ping.exe
-
C:\Windows\system32\taskeng.exetaskeng.exe {C95235A1-EBF1-4511-8C42-931763C72920} S-1-5-21-3825035466-2522850611-591511364-1000:EIDQHRRL\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\ktmutil.exeC:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\ktmutil.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x56c1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
22240d24a90646180c360d29e2e91f22
SHA18cd225acf713a4ae4472f02d641bd8f5ba6b9af5
SHA25676b42132732565417f394a8fd424aacdc714df483238f523777e6071dfcdfdd8
SHA512cdd01cf2e2930296524a097bfdd32a198c9e001c330dfd3f46681e3445ce6c3bd9782271df20f0216ddd69a7fbe1cf12bda4454aeb0dc6b8be0e405efda57e87
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{712B30E1-2415-11EB-A309-520DDC0DB10A}.datMD5
743f7b8621932e6db97034872ac72334
SHA163dce411697ef38c9e537ef834c0e263afcecb25
SHA2563cac95d4fa84cbed86724b10ef608df8fd942a2c93f39e705f5fd2c96c5a651e
SHA5125b80f1f4f71303a747e41155888b9753a68102a4290a505243c20cadcc7e2d01acc9ff97158574d6ba599954c8c30cb0aff4009b834ef534d1f40fd5953537a1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\KGXOCN0B.txtMD5
ff0c355807b6bdad7812b1bc0fb20553
SHA1ab6f1ac5cb658d659580ea85a3c27e2517fc9035
SHA2561721ebcbdbe08c46225be32adefdb1179e006060d46d387abe180cccd7738ea8
SHA512a6f05094293778d67b8d3803ffb725b292138193358e7ad6e6b4b0500caf9fab0e385a75f611d331be67fbfe3156894b8535e0f1c09acaf5053e8d90d8eeb75c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\StartUp\ktmutil.lnkMD5
149dd9ab9038a4a2e8832a055054e260
SHA14e934f2a2526efce62f6102675658d885b0ad6d6
SHA256641d92eb2b929ba5b56e1bbee69325cea14323388e19fda568a195709f1503f0
SHA5122c91d0c850117c83d8bac68a575a433ec6ea4df65be0f2b0ec351534f00e82cad67fabcd2ee7d8b82b4951dfe14a35c31b970bc72c114b011162f9f8c138b204
-
C:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\ktmutil.exeMD5
fe3e59ba0fd4cfa9438a2d95a629d4a5
SHA1928ed756321f9fedb5c013f0d9a64ffc234fa620
SHA2561eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4
SHA512f1bfa9d4a793ce3d73ed44206442dab598f9ebdf4a9a3d9f993ef37f4b824be2d0a7430507a061be525e5b525e1656871b0562088a5fa8ab25961d48c63e6c9d
-
C:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\ktmutil.exeMD5
fe3e59ba0fd4cfa9438a2d95a629d4a5
SHA1928ed756321f9fedb5c013f0d9a64ffc234fa620
SHA2561eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4
SHA512f1bfa9d4a793ce3d73ed44206442dab598f9ebdf4a9a3d9f993ef37f4b824be2d0a7430507a061be525e5b525e1656871b0562088a5fa8ab25961d48c63e6c9d
-
C:\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\ktmutil.exeMD5
fe3e59ba0fd4cfa9438a2d95a629d4a5
SHA1928ed756321f9fedb5c013f0d9a64ffc234fa620
SHA2561eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4
SHA512f1bfa9d4a793ce3d73ed44206442dab598f9ebdf4a9a3d9f993ef37f4b824be2d0a7430507a061be525e5b525e1656871b0562088a5fa8ab25961d48c63e6c9d
-
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.htmlMD5
0255e3015bb3c9186c1473f74cb81cbf
SHA1a76fba429f1748d09cad81847607e8e4c6161713
SHA2562c6a45a800081d0ec88305af791bce964f090c3ebc009b8c18911a1102953273
SHA5127add8f0df676f97b10f51ae1cbad45cfeef7c09925991e9a3c86e592027825be028e713046ee5278510ce0911e21e59000716fda59ded6ff8f12cf43b692a52c
-
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.txtMD5
32aac5818861b5dfebae8cc492ed590b
SHA1c1a238e1219ae2cea62844deb2ee53d46f518a59
SHA256bc7f2402c844593f52af1675253b1423d27229445a1e85502f6aa674efe79624
SHA5127916b746391fafb5b4f3dac66b708740b1b97b8574ddf66493346d74a41b3bfa464c9529dadf922aa3be58c499e0c2f8e3bac020c981a31ececc20cd910790fa
-
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.urlMD5
03f0f54f46bbfdb94b25557c613c59fe
SHA1b248dcbed8b425a85e578df413fefea67d055058
SHA2565d1321be5aa3be52a6de05670fc086e2bde96790fc74c9b219811902428cf666
SHA512e0deb51d49277485592f3f48158a58619636c4c21e8c7ad392d88e64ec273c3427cac473eecdfd6f44c4883c9508339757e592ab16440cea33e5896d49263d56
-
C:\Users\Admin\Desktop\# DECRYPT MY FILES #.vbsMD5
1c2a24505278e661eca32666d4311ce5
SHA1d1deb57023bbe38a33f0894b6a9a7bbffbfdeeee
SHA2563f0dc6126cf33e7aa725df926a1b7d434eaf62a69f42e1b8ae4c110fd3572628
SHA512ce866f2c4b96c6c7c090f4bf1708bfebdfcd58ce65a23bdc124a13402ef4941377c7e286e6156a28bd229e422685454052382f1f532545bc2edf07be4861b36c
-
\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\ktmutil.exeMD5
fe3e59ba0fd4cfa9438a2d95a629d4a5
SHA1928ed756321f9fedb5c013f0d9a64ffc234fa620
SHA2561eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4
SHA512f1bfa9d4a793ce3d73ed44206442dab598f9ebdf4a9a3d9f993ef37f4b824be2d0a7430507a061be525e5b525e1656871b0562088a5fa8ab25961d48c63e6c9d
-
\Users\Admin\AppData\Roaming\{9E67C82F-C7A5-CEBB-D215-2DD654B83DB5}\ktmutil.exeMD5
fe3e59ba0fd4cfa9438a2d95a629d4a5
SHA1928ed756321f9fedb5c013f0d9a64ffc234fa620
SHA2561eef5d3f564b8768d3356319fb4bd081b961bfb2fd7fefce3f4dadc80ef534d4
SHA512f1bfa9d4a793ce3d73ed44206442dab598f9ebdf4a9a3d9f993ef37f4b824be2d0a7430507a061be525e5b525e1656871b0562088a5fa8ab25961d48c63e6c9d
-
memory/616-7-0x0000000000000000-mapping.dmp
-
memory/772-14-0x0000000000000000-mapping.dmp
-
memory/1196-6-0x000007FEF6B80000-0x000007FEF6DFA000-memory.dmpFilesize
2.5MB
-
memory/1424-16-0x0000000000000000-mapping.dmp
-
memory/1444-1-0x0000000000000000-mapping.dmp
-
memory/1476-17-0x0000000000000000-mapping.dmp
-
memory/1736-9-0x0000000000000000-mapping.dmp
-
memory/1760-4-0x0000000000000000-mapping.dmp
-
memory/1764-12-0x0000000000000000-mapping.dmp
-
memory/1812-3-0x0000000000000000-mapping.dmp
-
memory/1928-23-0x0000000000000000-mapping.dmp
-
memory/2140-28-0x0000000000000000-mapping.dmp
-
memory/2180-29-0x0000000000000000-mapping.dmp
-
memory/2268-30-0x0000000000000000-mapping.dmp