Resubmissions
19-11-2020 14:39
201119-59epbrqadx 1019-11-2020 14:22
201119-ff99dc42e6 1019-11-2020 14:16
201119-298y5e8ncj 9Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-11-2020 14:39
Static task
static1
Behavioral task
behavioral1
Sample
f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe
Resource
win10v20201028
General
-
Target
f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe
-
Size
1.8MB
-
MD5
10d7151b9ee53b8da8ee6f85001ffb20
-
SHA1
76d33ef58ea7b012342d975d871db64840da9675
-
SHA256
f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093
-
SHA512
1c6d2d7f509b462b5d48db61817ee42a7204d10141c59394eb190d0dba733b831a6344bb85197dfac358939379e640c9f38732d376e28f92e187806ca574d10f
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OPENTHIS.html
insupport@messagesafe.io
14BfVG4vH71NLmhu7vFKi9EMmeZFoiAsYP
https://bitcoin.org/en/buy
https://buy.bitcoin.com
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Modifies extensions of user files 14 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\RestoreApprove.tiff f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe File created C:\Users\Admin\Pictures\DenySuspend.tif.REDROMAN f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe File created C:\Users\Admin\Pictures\SetUnblock.crw.REDROMAN f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\DenyLock.tiff f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe File created C:\Users\Admin\Pictures\DenyLock.tiff.REDROMAN f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe File created C:\Users\Admin\Pictures\RestartClear.tif.REDROMAN f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\PushSet.tiff f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe File created C:\Users\Admin\Pictures\SetRegister.crw.REDROMAN f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe File created C:\Users\Admin\Pictures\PushSet.tiff.REDROMAN f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe File created C:\Users\Admin\Pictures\RestoreApprove.tiff.REDROMAN f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\InvokeRename.tiff f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe File created C:\Users\Admin\Pictures\InvokeRename.tiff.REDROMAN f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe File created C:\Users\Admin\Pictures\MeasureTrace.crw.REDROMAN f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe File created C:\Users\Admin\Pictures\MountHide.raw.REDROMAN f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe -
Drops startup file 1 IoCs
Processes:
f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OPENTHIS.html f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe -
Modifies service 2 TTPs 5 IoCs
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 1608 vssadmin.exe 2620 vssadmin.exe -
Processes:
iexplore.exeiexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C98E5C71-2A74-11EB-B97E-C2515532CB8E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40fe0e6881bed601 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000039e08b06c84715459283081ff7bb5a600000000002000000000010660000000100002000000005f7b184b5300c8a71b07c9202c5a9fe8a3e3ead9cbc51643c14f06e3610ed4b000000000e80000000020000200000003f38e62b67502e68d6509db9b85cb9ad39fde61b0d83ca5275f7d21cb4ab6ec52000000044d8eed28c07bc6e614d5b366eb64468207104a636b493cc114ac58a09cd92a140000000835ecdb04f00cab1aec836d1384f8e462d932f1acb29d0cbe090172dbd4f14816342dee0c3b36371038aa2ad3754ba814c7b737636e2779c85eabe1cd1a316ae iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{9B58AE01-2A74-11EB-B97E-C2515532CB8E} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe -
Modifies registry class 36 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 7e003100000000005c51db98110050726f6772616d730000660008000400efbe5c51a6965c51db982a000000d70100000000020000000000000000003c0000000000500072006f006700720061006d007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370038003200000018000000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 = 7a003100000000007351787411005374617274757000640008000400efbe5c51ac96735178742a000000de3d00000000030000000000000000003a00000000005300740061007200740075007000000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370038003700000016000000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\NodeSlot = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 7e0074001c004346534616003100000000005c51a696122041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f3c0008000400efbe5c51a6965c51a6962a000000d10100000000020000000000000000000000000000004100700070004400610074006100000042000000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_Classes\Local Settings iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 58003100000000005c51939914204d4943524f537e310000400008000400efbe5c51a6965c5193992a000000d30100000000020000000000000000000000000000004d006900630072006f0073006f0066007400000018000000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 82003100000000005c51ad96110053544152544d7e3100006a0008000400efbe5c51a6965c51ac962a000000d60100000000020000000000000000004000000000005300740061007200740020004d0065006e007500000040007300680065006c006c00330032002e0064006c006c002c002d0032003100370038003600000018000000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 52003100000000005c51a59a1020526f616d696e67003c0008000400efbe5c51a6965c51a59a2a000000d201000000000200000000000000000000000000000052006f0061006d0069006e006700000016000000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 52003100000000005c51dd98102057696e646f7773003c0008000400efbe5c51a6965c51dd982a000000d4010000000002000000000000000000000000000000570069006e0064006f0077007300000016000000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\MRUListEx = ffffffff iexplore.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepowershell.exepid process 928 powershell.exe 344 powershell.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
powershell.exepowershell.exevssvc.exeAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 928 powershell.exe Token: SeDebugPrivilege 344 powershell.exe Token: SeBackupPrivilege 816 vssvc.exe Token: SeRestorePrivilege 816 vssvc.exe Token: SeAuditPrivilege 816 vssvc.exe Token: 33 2164 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2164 AUDIODG.EXE Token: 33 2164 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2164 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exeiexplore.exepid process 2772 iexplore.exe 2300 iexplore.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEiexplore.exeIEXPLORE.EXEpid process 2772 iexplore.exe 2772 iexplore.exe 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2880 IEXPLORE.EXE 2772 iexplore.exe 2324 IEXPLORE.EXE 2324 IEXPLORE.EXE 2300 iexplore.exe 2300 iexplore.exe 324 IEXPLORE.EXE 324 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exepowershell.execmd.exenet.exenet.exeiexplore.exeiexplore.exedescription pid process target process PID 1360 wrote to memory of 928 1360 f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe powershell.exe PID 1360 wrote to memory of 928 1360 f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe powershell.exe PID 1360 wrote to memory of 928 1360 f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe powershell.exe PID 1360 wrote to memory of 344 1360 f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe powershell.exe PID 1360 wrote to memory of 344 1360 f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe powershell.exe PID 1360 wrote to memory of 344 1360 f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe powershell.exe PID 344 wrote to memory of 308 344 powershell.exe cmd.exe PID 344 wrote to memory of 308 344 powershell.exe cmd.exe PID 344 wrote to memory of 308 344 powershell.exe cmd.exe PID 308 wrote to memory of 1608 308 cmd.exe vssadmin.exe PID 308 wrote to memory of 1608 308 cmd.exe vssadmin.exe PID 308 wrote to memory of 1608 308 cmd.exe vssadmin.exe PID 308 wrote to memory of 2620 308 cmd.exe vssadmin.exe PID 308 wrote to memory of 2620 308 cmd.exe vssadmin.exe PID 308 wrote to memory of 2620 308 cmd.exe vssadmin.exe PID 308 wrote to memory of 2652 308 cmd.exe net.exe PID 308 wrote to memory of 2652 308 cmd.exe net.exe PID 308 wrote to memory of 2652 308 cmd.exe net.exe PID 2652 wrote to memory of 2664 2652 net.exe net1.exe PID 2652 wrote to memory of 2664 2652 net.exe net1.exe PID 2652 wrote to memory of 2664 2652 net.exe net1.exe PID 308 wrote to memory of 2692 308 cmd.exe net.exe PID 308 wrote to memory of 2692 308 cmd.exe net.exe PID 308 wrote to memory of 2692 308 cmd.exe net.exe PID 2692 wrote to memory of 2704 2692 net.exe net1.exe PID 2692 wrote to memory of 2704 2692 net.exe net1.exe PID 2692 wrote to memory of 2704 2692 net.exe net1.exe PID 2772 wrote to memory of 2880 2772 iexplore.exe IEXPLORE.EXE PID 2772 wrote to memory of 2880 2772 iexplore.exe IEXPLORE.EXE PID 2772 wrote to memory of 2880 2772 iexplore.exe IEXPLORE.EXE PID 2772 wrote to memory of 2880 2772 iexplore.exe IEXPLORE.EXE PID 2772 wrote to memory of 2324 2772 iexplore.exe IEXPLORE.EXE PID 2772 wrote to memory of 2324 2772 iexplore.exe IEXPLORE.EXE PID 2772 wrote to memory of 2324 2772 iexplore.exe IEXPLORE.EXE PID 2772 wrote to memory of 2324 2772 iexplore.exe IEXPLORE.EXE PID 2300 wrote to memory of 324 2300 iexplore.exe IEXPLORE.EXE PID 2300 wrote to memory of 324 2300 iexplore.exe IEXPLORE.EXE PID 2300 wrote to memory of 324 2300 iexplore.exe IEXPLORE.EXE PID 2300 wrote to memory of 324 2300 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe"C:\Users\Admin\AppData\Local\Temp\f0fbd0654d4bf299c08f1f83e7b6c3a1f332b49c24b3cf0b9b87757b8c13f093.bin.sample.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -WindowStyle Hidden get-wmiobject win32_computersystem | "fl model"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Start-Process C:\ProgramData\amdkey.bat -Verb runas2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\ProgramData\amdkey.bat"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- Interacts with shadow copies
-
C:\Windows\system32\vssadmin.exevssadmin.exe Resize ShadowStorage /For=C: /On=C: /MaxSize=320MB4⤵
- Interacts with shadow copies
-
C:\Windows\system32\net.exenet user /add RedROMAN p4zzaub71h4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user /add RedROMAN p4zzaub71h5⤵
-
C:\Windows\system32\net.exenet localgroup administrators RedROMAN /add4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators RedROMAN /add5⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OPENTHIS.html1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2772 CREDAT:406541 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4881⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\ProgramData\RR_README.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2300 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\RR_README.htmlMD5
a15162a522fbd1ed603ab6415f4de0de
SHA133299e2baaff029b82c724630d4b5e5424353f18
SHA2565d4d8f87b815bbc435d6b8b1b3d3349d06a6d82226a4ad0e17accf8b750d80dc
SHA512d45ba782b9977131ce3b30661ec5db27fd94a169dc42ca6f0a907db20186c54348eaeae763279113fb81783d56478b9c98b2038948eb4c7cb18d00f4c292650d
-
C:\ProgramData\amdkey.batMD5
e1ccfa2c9fccc3306d6a2beafee97e88
SHA1769a6f5692364611fb1c97b7f8909e305df46b0c
SHA2568c6a13f418d0c11640ea15a0c42a4edc9f4175c4c924573c35b86929a7d25aaf
SHA512f5ecf42ded57faa60cd98f7e43438c7b7158afb7061b836805469840880ae6b980dfe99f66bce8b52f2fa27eb0d07a48631da8f8fb82a3f12754a2024d70460c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1FC0448E6D3D5712272FAF5B90A70C5EMD5
ce16928d38d0901c418aff44b227cedb
SHA19007bff6afc91daad3e817b4286130781a6542b1
SHA256c2ab6b4ebd1b078712e9bf8ce2d5966763525edf4063dc367afba3be13690d14
SHA5122941e3a6e20f59f0001c3ecadcbad19bcf3f271637cc26eea35d6a7fc66c5916afc19040918f5f44e253d514ca2f76f949c0bb46328788ef76d08225e92fd792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08MD5
081d36f197084f70fea789af4c4c3437
SHA12bde05c8344d838c1766e1f6d03d7194a0c95953
SHA256b09b06f04df6e235dddede2c5d9e85782e733dc057e1afd58963ca020cc0f4a5
SHA512a6dff92c0b473c25ac82e8382b35fb7c73ed61e8469863e5baed0ae6c8f84448c9e4ca52b1bef06103946f2bfeee128ab22e9d71b8653c62db782a1ba4135bcd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1FC0448E6D3D5712272FAF5B90A70C5EMD5
a142c049102cfb1a971570598cdb9d6b
SHA16b8e58ccf1052523786f22c532bb70b9f0610442
SHA256210716504493a8b4730b84d72fccab36daeb00d0551cc62a64e19bb5c7230cdc
SHA512996f7a6beed508e89e1c738b47bb799f12377d22e9ee2ac5fccf1f5c3d857d14efe138dfa09a5d07fd46ba1a6cba4229c000189e8d5abd931bb8e4356acb81d4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
26f61685911dca72407748550ae39238
SHA1ca42c1b43845a89f73489db1815423cd79108909
SHA2562474a15b274487da981308612515a4ca0ef7af25f25df8abbc9c035cfb54d90b
SHA51239843bf7b0fcf564862d26f46d881096f8bc0f43bbd99c208a5a273464bb8090162e1f2ff88526a2c973b3a9ba2a1af67d91ece081cb9bcbbfbba5acc20ef174
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08MD5
50394070d7c576e2547ca91f2fac267a
SHA135ae0fbce2f3b6e045ba74708ab27c6735e57d7b
SHA2561bda9c259d3303ba395788b76b5b7b83d28e40d7d4430ddd694904f3379996df
SHA512c74b0188c70722a1a309a24bad5f4ef778bb0ca5abef09aade78b1af23b2e875998309e270f2aad42478f813742f75d73277530a72c5b36cad767846266da936
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{C5457E20-1950-11EB-8A4C-EE401B9E63CB}.datMD5
72234a28b8d8e1abba4012ee4caddd6f
SHA1f83749e9b6ad91618993033d838d5d88c89453b4
SHA2560d9c245c61c87c46762961a7c3376cf0ba1aa280d9ac1290989b4c1c13b0fd9c
SHA5122deb3d930c84e7572728b6820176a7d1d7d06ae3c1a9f36b49aedc8a651784b4cbd1f1bf8691f3c8232f0edb6f34cdc161b67921546d6b6de809a727e6112fd0
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{A8B7A740-2A74-11EB-B97E-C2515532CB8E}.datMD5
451d69d9c5e016fbabf779da471253c5
SHA1412a05e256dec00559ca6af71a73011524f38805
SHA2568a43aa8746f40228b1e391809439d6ada60a2670a060523b2f73d77df1dce91e
SHA512a646cb5cf1d5fa4a2e0f723cedcb019681b9dc69bf02d116262ec0c992c086ce20be5ff117762f011498a18b89032842431a446b1c82b6ec7e43c92d6f53e705
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\{A8B7A741-2A74-11EB-B97E-C2515532CB8E}.datMD5
3ca3fcd68b636e740b1fe93ae7f814a8
SHA15e4e7d2450ac84a171958d98ca56741807a781be
SHA25671b41d0f5ed05ed411a104dcd5559633536b06e5f8538a690fc76dd8423bcae7
SHA512ed17cd84aa84458ca3feb17513c9896b42a985fa556bc81be07854292c0d0d7ea2846228e22c573db295542fc8d1571329445e780f13a4894ca900b48bcd8ffe
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndexMD5
f2a1d83d62fc57c60847d2b60ab72783
SHA1ef7dc42433df61644eb8260e8f9d311da0a0635c
SHA25672ddbe0c347462e8f04d53a8fd79e13699b7b598f2701215f797cffad72828fe
SHA512b5dc6610571791c71c5a41e687578d783f401adabcebb3120886e979362f111ca3d0592fbf923ac6138e158931069ad901f5a986282294c1cb8a044b4ea5ddb5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D73194RS\small_red_dot[1].pngMD5
0c2c38ba38932e23f84267ef229fb59a
SHA16e9c9303af9a6172a1868c352ea8978a3cc29b87
SHA2563d6751064b2f32f038aca08c197acea9b5bf514cabc3461fe9ec8a77180301f3
SHA512c609905ca019e4acd3acf42c5eef2a36c7aee3bfc5741e8cc556e44a7ddd110467e14efbcfbb095d50dd3f53288256602cbc2f7372bdf3cac4a156486c1b99b4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msMD5
24437168fa337f109afbf16a7e533ac2
SHA1e1af9a54ea28171417b49e5cc4b46bb01f4ea99c
SHA256ce145af1f6a731429cb87f34478a88eb4699b79b59c3306a1d3809364aa4008d
SHA51242e884749861b5a6a5f0b3f2359b778bd5de900dc72b71022bb2ad7782e4c898ff14c4cd0a02ea5560817507ab081bb7792446d5bcb7840a5b5ec4ee331fcb3c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OPENTHIS.htmlMD5
a15162a522fbd1ed603ab6415f4de0de
SHA133299e2baaff029b82c724630d4b5e5424353f18
SHA2565d4d8f87b815bbc435d6b8b1b3d3349d06a6d82226a4ad0e17accf8b750d80dc
SHA512d45ba782b9977131ce3b30661ec5db27fd94a169dc42ca6f0a907db20186c54348eaeae763279113fb81783d56478b9c98b2038948eb4c7cb18d00f4c292650d
-
memory/308-19-0x0000000000000000-mapping.dmp
-
memory/324-39-0x0000000000000000-mapping.dmp
-
memory/344-17-0x000000001AB40000-0x000000001AB41000-memory.dmpFilesize
4KB
-
memory/344-15-0x0000000002500000-0x0000000002501000-memory.dmpFilesize
4KB
-
memory/344-11-0x000007FEF54F0000-0x000007FEF5EDC000-memory.dmpFilesize
9.9MB
-
memory/344-12-0x0000000002020000-0x0000000002021000-memory.dmpFilesize
4KB
-
memory/344-13-0x000000001AC70000-0x000000001AC71000-memory.dmpFilesize
4KB
-
memory/344-9-0x0000000000000000-mapping.dmp
-
memory/344-14-0x00000000020D0000-0x00000000020D1000-memory.dmpFilesize
4KB
-
memory/928-3-0x00000000022E0000-0x00000000022E1000-memory.dmpFilesize
4KB
-
memory/928-4-0x000000001AAC0000-0x000000001AAC1000-memory.dmpFilesize
4KB
-
memory/928-8-0x000000001C670000-0x000000001C671000-memory.dmpFilesize
4KB
-
memory/928-5-0x0000000002440000-0x0000000002441000-memory.dmpFilesize
4KB
-
memory/928-6-0x0000000002510000-0x0000000002511000-memory.dmpFilesize
4KB
-
memory/928-2-0x000007FEF5560000-0x000007FEF5F4C000-memory.dmpFilesize
9.9MB
-
memory/928-7-0x000000001B430000-0x000000001B431000-memory.dmpFilesize
4KB
-
memory/928-1-0x0000000000000000-mapping.dmp
-
memory/1360-0-0x000000013FB60000-0x000000013FD31000-memory.dmpFilesize
1.8MB
-
memory/1608-20-0x0000000000000000-mapping.dmp
-
memory/2324-30-0x0000000000000000-mapping.dmp
-
memory/2620-21-0x0000000000000000-mapping.dmp
-
memory/2652-22-0x0000000000000000-mapping.dmp
-
memory/2664-23-0x0000000000000000-mapping.dmp
-
memory/2692-24-0x0000000000000000-mapping.dmp
-
memory/2704-25-0x0000000000000000-mapping.dmp
-
memory/2784-26-0x000007FEF60B0000-0x000007FEF632A000-memory.dmpFilesize
2.5MB
-
memory/2880-27-0x0000000000000000-mapping.dmp
-
memory/2880-38-0x00000000061F0000-0x0000000006213000-memory.dmpFilesize
140KB