Analysis
-
max time kernel
298s -
max time network
195s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-02-2024 05:02
Static task
static1
Behavioral task
behavioral1
Sample
fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe
Resource
win10-20231215-en
General
-
Target
fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe
-
Size
824KB
-
MD5
f2676ea250de972076b79913ffa7fbb8
-
SHA1
5b6b1b7e54736260173f6e8b44f33bcc8260b6e2
-
SHA256
fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22
-
SHA512
f2f2a6eec3139c233378fb8888edbe5c8bdd76869a3e3e10d1275a7fcc2e43667ea5031a6db629556d4d92d9d188dc3acd772fe3709ff664efc66deb196881d9
-
SSDEEP
12288:csaCCG1t2SJ0uT2gszaWjkCI+e9KVmkcU/09xM19+uE+3jf3wptt0ws:Z1vqRaWgC69jkt0LzuvjotSw
Malware Config
Extracted
djvu
http://habrafa.com/test1/get.php
-
extension
.cdcc
-
offline_id
LBxKKiegnAy53rpqH3Pj2j46vwldiEt9kqHSuMt1
-
payload_url
http://brusuax.com/dl/build2.exe
http://habrafa.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-iVcrVFVRqu Price of private key and decrypt software is $1999. Discount 50% available if you contact us first 72 hours, that's price for you is $999. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0846ASdw
Extracted
vidar
7.6
1b9d7ec5a25ab9d78c31777a0016a097
https://t.me/tvrugrats
https://steamcommunity.com/profiles/76561199627279110
-
profile_id_v2
1b9d7ec5a25ab9d78c31777a0016a097
Signatures
-
Detect Vidar Stealer 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2808-96-0x0000000000230000-0x0000000000260000-memory.dmp family_vidar_v7 behavioral1/memory/2684-99-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2684-98-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2684-93-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 behavioral1/memory/2684-255-0x0000000000400000-0x0000000000643000-memory.dmp family_vidar_v7 -
Detected Djvu ransomware 16 IoCs
Processes:
resource yara_rule behavioral1/memory/1720-5-0x0000000001E20000-0x0000000001F3B000-memory.dmp family_djvu behavioral1/memory/2164-7-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2164-3-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2164-8-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2164-44-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2448-53-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2448-52-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2448-69-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2448-70-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2448-77-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2448-76-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2448-74-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2448-100-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2808-94-0x00000000008B0000-0x00000000009B0000-memory.dmp family_djvu behavioral1/memory/2448-158-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/2808-257-0x0000000000230000-0x0000000000260000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Downloads MZ/PE file
-
Executes dropped EXE 12 IoCs
Processes:
build2.exebuild2.exebuild3.exebuild3.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exemstsca.exepid process 2808 build2.exe 2684 build2.exe 1648 build3.exe 2044 build3.exe 1176 mstsca.exe 2968 mstsca.exe 488 mstsca.exe 576 mstsca.exe 1900 mstsca.exe 980 mstsca.exe 2720 mstsca.exe 2596 mstsca.exe -
Loads dropped DLL 11 IoCs
Processes:
fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exeWerFault.exepid process 2448 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe 2448 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe 2448 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe 2448 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe 2344 WerFault.exe 2344 WerFault.exe 2344 WerFault.exe 2344 WerFault.exe 2344 WerFault.exe 2344 WerFault.exe 2344 WerFault.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\b3311eab-6230-4dc9-bb68-d5817805de1b\\fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe\" --AutoStart" fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 3 api.2ip.ua 4 api.2ip.ua 16 api.2ip.ua -
Suspicious use of SetThreadContext 8 IoCs
Processes:
fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exefd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exebuild2.exebuild3.exemstsca.exemstsca.exemstsca.exemstsca.exedescription pid process target process PID 1720 set thread context of 2164 1720 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 2760 set thread context of 2448 2760 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 2808 set thread context of 2684 2808 build2.exe build2.exe PID 1648 set thread context of 2044 1648 build3.exe build3.exe PID 1176 set thread context of 2968 1176 mstsca.exe mstsca.exe PID 488 set thread context of 576 488 mstsca.exe mstsca.exe PID 1900 set thread context of 980 1900 mstsca.exe mstsca.exe PID 2720 set thread context of 2596 2720 mstsca.exe mstsca.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2344 2684 WerFault.exe build2.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1164 schtasks.exe 2508 schtasks.exe -
Processes:
fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exebuild2.exefd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a build2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 build2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exefd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exepid process 2164 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe 2448 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe 2448 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exefd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exefd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exefd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exebuild2.exebuild3.exebuild3.exebuild2.exedescription pid process target process PID 1720 wrote to memory of 2164 1720 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 1720 wrote to memory of 2164 1720 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 1720 wrote to memory of 2164 1720 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 1720 wrote to memory of 2164 1720 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 1720 wrote to memory of 2164 1720 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 1720 wrote to memory of 2164 1720 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 1720 wrote to memory of 2164 1720 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 1720 wrote to memory of 2164 1720 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 1720 wrote to memory of 2164 1720 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 1720 wrote to memory of 2164 1720 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 1720 wrote to memory of 2164 1720 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 2164 wrote to memory of 2856 2164 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe icacls.exe PID 2164 wrote to memory of 2856 2164 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe icacls.exe PID 2164 wrote to memory of 2856 2164 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe icacls.exe PID 2164 wrote to memory of 2856 2164 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe icacls.exe PID 2164 wrote to memory of 2760 2164 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 2164 wrote to memory of 2760 2164 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 2164 wrote to memory of 2760 2164 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 2164 wrote to memory of 2760 2164 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 2760 wrote to memory of 2448 2760 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 2760 wrote to memory of 2448 2760 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 2760 wrote to memory of 2448 2760 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 2760 wrote to memory of 2448 2760 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 2760 wrote to memory of 2448 2760 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 2760 wrote to memory of 2448 2760 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 2760 wrote to memory of 2448 2760 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 2760 wrote to memory of 2448 2760 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 2760 wrote to memory of 2448 2760 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 2760 wrote to memory of 2448 2760 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 2760 wrote to memory of 2448 2760 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe PID 2448 wrote to memory of 2808 2448 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe build2.exe PID 2448 wrote to memory of 2808 2448 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe build2.exe PID 2448 wrote to memory of 2808 2448 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe build2.exe PID 2448 wrote to memory of 2808 2448 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe build2.exe PID 2808 wrote to memory of 2684 2808 build2.exe build2.exe PID 2808 wrote to memory of 2684 2808 build2.exe build2.exe PID 2808 wrote to memory of 2684 2808 build2.exe build2.exe PID 2808 wrote to memory of 2684 2808 build2.exe build2.exe PID 2808 wrote to memory of 2684 2808 build2.exe build2.exe PID 2808 wrote to memory of 2684 2808 build2.exe build2.exe PID 2808 wrote to memory of 2684 2808 build2.exe build2.exe PID 2808 wrote to memory of 2684 2808 build2.exe build2.exe PID 2808 wrote to memory of 2684 2808 build2.exe build2.exe PID 2808 wrote to memory of 2684 2808 build2.exe build2.exe PID 2808 wrote to memory of 2684 2808 build2.exe build2.exe PID 2448 wrote to memory of 1648 2448 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe build3.exe PID 2448 wrote to memory of 1648 2448 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe build3.exe PID 2448 wrote to memory of 1648 2448 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe build3.exe PID 2448 wrote to memory of 1648 2448 fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe build3.exe PID 1648 wrote to memory of 2044 1648 build3.exe build3.exe PID 1648 wrote to memory of 2044 1648 build3.exe build3.exe PID 1648 wrote to memory of 2044 1648 build3.exe build3.exe PID 1648 wrote to memory of 2044 1648 build3.exe build3.exe PID 1648 wrote to memory of 2044 1648 build3.exe build3.exe PID 1648 wrote to memory of 2044 1648 build3.exe build3.exe PID 1648 wrote to memory of 2044 1648 build3.exe build3.exe PID 1648 wrote to memory of 2044 1648 build3.exe build3.exe PID 1648 wrote to memory of 2044 1648 build3.exe build3.exe PID 1648 wrote to memory of 2044 1648 build3.exe build3.exe PID 2044 wrote to memory of 1164 2044 build3.exe schtasks.exe PID 2044 wrote to memory of 1164 2044 build3.exe schtasks.exe PID 2044 wrote to memory of 1164 2044 build3.exe schtasks.exe PID 2044 wrote to memory of 1164 2044 build3.exe schtasks.exe PID 2684 wrote to memory of 2344 2684 build2.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe"C:\Users\Admin\AppData\Local\Temp\fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe"C:\Users\Admin\AppData\Local\Temp\fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe"2⤵
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\b3311eab-6230-4dc9-bb68-d5817805de1b" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe"C:\Users\Admin\AppData\Local\Temp\fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe"C:\Users\Admin\AppData\Local\Temp\fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\d391c44d-586d-4973-8f66-eef2a2d5ace8\build2.exe"C:\Users\Admin\AppData\Local\d391c44d-586d-4973-8f66-eef2a2d5ace8\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\d391c44d-586d-4973-8f66-eef2a2d5ace8\build3.exe"C:\Users\Admin\AppData\Local\d391c44d-586d-4973-8f66-eef2a2d5ace8\build3.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\d391c44d-586d-4973-8f66-eef2a2d5ace8\build3.exe"C:\Users\Admin\AppData\Local\d391c44d-586d-4973-8f66-eef2a2d5ace8\build3.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\d391c44d-586d-4973-8f66-eef2a2d5ace8\build2.exe"C:\Users\Admin\AppData\Local\d391c44d-586d-4973-8f66-eef2a2d5ace8\build2.exe"1⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 14482⤵
- Loads dropped DLL
- Program crash
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"1⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {F9CAA4F2-7878-4452-BF69-5CA134A91758} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]1⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
1KB
MD58112ab2a9d7578692e66734917d00015
SHA15dc1f7cb2c66c925d195fb98784917d108a001dd
SHA256919561b1927726f5218e79f21184c4bf7117db4466686fc93d3d5dbc1380033b
SHA512538f1f36b44d628d2ade163cc40deb58b50cb7fbd56019d9526c8233c30771db8542ed5786d311322dfd2e9d44e979da9513c4a0bbc7416b47bb7beca90013d1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
49KB
MD570b43da95addb4da1069d63baff5937d
SHA19401f5dfab2ef21144c25465d6e9e48a18c789f5
SHA256d39e6e420ff4c205d3be74ac68407e6c8039f2a6f887df05cd325c3dd54bca12
SHA5128ee2d515a41fd69e574d64676bd8d3c87864bde02cb020ec89e601391be423ab9fb0355e1c9d02268fa2e09ab065a072ceb4a0540ce9c726f9eeb84f9e4275c2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464Filesize
724B
MD58202a1cd02e7d69597995cabbe881a12
SHA18858d9d934b7aa9330ee73de6c476acf19929ff6
SHA25658f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5
SHA51297ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAFilesize
410B
MD5eb70a5bc31249797459773c6892c28f0
SHA1fc64692592ad9f89382e5f8a99c9c941af89b252
SHA25615c862cdcc9c23a2963975297dce56a9c77a34356060bf8c5a8f2c745d5eaecf
SHA512c4cf462589df19534a5b2f96f48ffc236b31c4d16ff52922c72588542bfc97fde65605a451cbf99fddb3cc486d8f4a913117d0d99059365188cefbf5cb0dfc30
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5b97d48b863f4c0edc2cf3b8eabe2680c
SHA12efe7d13ff6f6ce9a0ac176f6a2483b6b79c17a1
SHA256c919b2842c35f5867bf24c5c1923875c71e02559616b419a240f2fbe768bdbaa
SHA512effbef5baeecd6accfb435d1c664d66d16331f8306779f6c7f6423a6276103febb6bfd5caa9e6bec7fac581925f73869cd1657da589b8631598042ee190830a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464Filesize
392B
MD5e7007714db4cf50d1982b594891b862a
SHA1164e55c2f7a26b8cf64a1d0573c2a615c9f8a341
SHA25605452e561bbdd41830a3e589fba0e629fa38296f6960eea0d62c0946bb81b8a0
SHA5123ea83ffc4413e5c5a9238701c0a5dc075b04654091f109d289dda6dee0804ce0753e268ab46bbb5dabb383f3db2d286cb598c4495df0557e6aba7125aa6de7be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
242B
MD5a26270c807f47fe50fad73d1903841ef
SHA1c2b0a57e24c695f44f2531716bb761bed002c374
SHA256ca461c69ba0a575ef0a0ef18746ecf4fa8a47dedc04de35a463df980d74e4634
SHA512ec2f1e21b89d8c5377e35e913060da1d81eacfd518c71d206c2d54fe9bef3f1ff88ab671ca461f2054859a661a98d02bb8de009a9cf3732f78467e9e04509de7
-
C:\Users\Admin\AppData\Local\Temp\Tar279E.tmpFilesize
69KB
MD582ed3cb2f90448b211352ae3a6e21396
SHA10aec9f6114afbe5a70f58842e1e6817da8fe51cc
SHA2569f3d96425f3627f120c5f3969ff40cf071963956064145cce91d30c94db5e6f6
SHA512a616724086ac32846dafd680594e87236e22083c2767537729e1f7bec74364a40c7b9cfd6dacbf7e33c067b231e06c23dd013e373ff2cf3c2a35de6ceae749f0
-
C:\Users\Admin\AppData\Local\b3311eab-6230-4dc9-bb68-d5817805de1b\fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22.exeFilesize
824KB
MD5f2676ea250de972076b79913ffa7fbb8
SHA15b6b1b7e54736260173f6e8b44f33bcc8260b6e2
SHA256fd08b9700202aa287b81b86e098983283a1bac60d3246397e48a35d07ea7fe22
SHA512f2f2a6eec3139c233378fb8888edbe5c8bdd76869a3e3e10d1275a7fcc2e43667ea5031a6db629556d4d92d9d188dc3acd772fe3709ff664efc66deb196881d9
-
C:\Users\Admin\AppData\Local\d391c44d-586d-4973-8f66-eef2a2d5ace8\build2.exeFilesize
214KB
MD5a2c9dc1add1066f8d6848b88aa2c91b5
SHA194b6ebcb69482faded513ea8d36e299af59b8a6b
SHA256f6ef51066d7dff894d7da7f182ec0d49d83202190ab8a913a8dd2c4b1cd83035
SHA51277489f4cb89446a05557879c2f89dcd77e15286aa64310d4383724796b5e896ded445c51b211045d3c9370afab7284d060b518a9ee507bbb51ae7c5371eefc70
-
C:\Users\Admin\AppData\Local\d391c44d-586d-4973-8f66-eef2a2d5ace8\build2.exeFilesize
103KB
MD52e980073923fb6f96698814e446123fe
SHA1d0953b5bd5029bdfcf22c94087c064b6c5d0d736
SHA256e882362812b67705cf2bc9ab2d4716123f9ea0dda99e9a592b607ca0d6f329bf
SHA512f5d0004bd152075f3ca7158d35ff7a04769f708be99b9dec4e2832cbfa2a1dd6c8b48c4fbaf2b5999f3a092994be3d53f54f3072046e8a90325dfa7398d9be04
-
C:\Users\Admin\AppData\Local\d391c44d-586d-4973-8f66-eef2a2d5ace8\build2.exeFilesize
258KB
MD5f918d4dbdaca71f15494cba2e59c1ea9
SHA1b295f2966fe91754a756df114516ee5cd616db1c
SHA256aa556eb605cf4f1ca288aea1626eb5027551a67a470a676d584ee5ec7c99fd5f
SHA5123b20c3f01134c963e1a3b74a877f3cd609efe1c0e89d546e0847e74a427c5bc00fab485bb4b3d68163d35d39ebdc2470072e1bf5dc2a36f185c00bb7100e8125
-
C:\Users\Admin\AppData\Local\d391c44d-586d-4973-8f66-eef2a2d5ace8\build2.exeFilesize
102KB
MD50add08242011916148598d35d49535b2
SHA126cddd5047f0b5d7eb28dc768c3d2e0cbfb8d273
SHA2562f5d8d62db434c4937e3cca817eb7e6e194600d266ae45ec64ec719709eb7407
SHA5121bf22e3703318d3e0fb50c5c28d897e21fcbfd6f83f0da66c71c45250bd5f05269d726585c3cfcf4110f18747a979877c70a98240742bd35fb676a3203e2e112
-
C:\Users\Admin\AppData\Local\d391c44d-586d-4973-8f66-eef2a2d5ace8\build3.exeFilesize
84KB
MD509de49457e1288770ac173b4708fe9a0
SHA1566a77dd926e4743d196a3069e9ac40d4ea19209
SHA2560f364e76246fe48b9182b10796c81ad9e27f55d9cc852287920c5e25d55cb151
SHA51254de678455756a287c341aec66ab7af705d90e32e49fd65c610ffc961f01269d4b832905062e8c907e85680e69394b9d6d19c5df10535f0261d81df41fd7badd
-
C:\Users\Admin\AppData\Local\d391c44d-586d-4973-8f66-eef2a2d5ace8\build3.exeFilesize
58KB
MD512236831107701d4a9db91dbf804a846
SHA16bdf5cba8b87f8957fb5fbe7322fbc1ac645fa0f
SHA25629dae201b8acc5babb100da73ea3e8680f2de0d13b63b87c5ec9cedf4fcdab6c
SHA51207dc5233cce4cdfdfa6ab9e5c2c9ab55ca9df5db7a3ac19be86a560a80a0fd5bd16b841da136cabde6cf2c0216e814da21d96c48987ae7d027dd3f07577628ac
-
C:\Users\Admin\AppData\Local\d391c44d-586d-4973-8f66-eef2a2d5ace8\build3.exeFilesize
138KB
MD5b649088295f6bbdb8fb82f9b819b8131
SHA1c0be015302039484d103530e501252addc730055
SHA256e73474f2893bf2d71208aaa8bf2384d3aebf9190a73626710aed246e55d8bec8
SHA512051ad2ca83453a44a9ad605236387617a428866434c4b8f5d5c754dea89d9cebd50f0e6024d37a3da20de27ef937e268766a75099ff02fe8ffedcb3028292abf
-
C:\Users\Admin\AppData\Local\d391c44d-586d-4973-8f66-eef2a2d5ace8\build3.exeFilesize
118KB
MD580965148bfe666d1241fb5c2f0ec2c5f
SHA10784c54d7bb70ca59173f7d4b53cae3b87de8237
SHA256dab6cf3f0c9bc4ce6b085ffa1f1f4995d4badb4bbc0d6aa05bcb165ec2607bf9
SHA51218955f767c2ad2185df40899b637cfa8ec318c1cd39f3f2c5510b5cc7f4e8d0ebaeccc701601ae59615ff5616b3691823dc3da04363f6562cc308a21abed3c0c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
299KB
MD541b883a061c95e9b9cb17d4ca50de770
SHA11daf96ec21d53d9a4699cea9b4db08cda6fbb5ad
SHA256fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408
SHA512cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319
-
\Users\Admin\AppData\Local\d391c44d-586d-4973-8f66-eef2a2d5ace8\build2.exeFilesize
385KB
MD563e4a9cd7a8b37335b5f18cefc5dd9d2
SHA1c781a30935afc452b108cc78724b60f389b78874
SHA256c1e75efde3fd1da605135e5c3ffab0073299c80632d136f8eeba9d4a7c98c70f
SHA5123818b5966938704c5830acb5426db7791f6ae476853248d8984b1aff35a6722a0684bea54a53ef6ded1f301f6de9ed044d45f007457a9c0f3a7ea3afc7bf0ecc
-
\Users\Admin\AppData\Local\d391c44d-586d-4973-8f66-eef2a2d5ace8\build2.exeFilesize
159KB
MD5dd050350c1d987a87d2fb9b6f291e498
SHA1cea55188fca263cb973f08832e0fbb74835b5529
SHA256a38c63fde9559f37f2d30c7f799831024057a15b8f3af189a5dec4123a5a2181
SHA51234705bb3e9c3fc5f59e88dc6d9921d5a8f18098c15c246a3dc1e9ea2f1070dc7163976f2579b3b63ec2862264b2b8810bde0f2e8e54f46a20ccb7a138b6d4157
-
\Users\Admin\AppData\Local\d391c44d-586d-4973-8f66-eef2a2d5ace8\build2.exeFilesize
162KB
MD5d4f56fa54edef1373d245a4b2fa09fa5
SHA1c446a724bb7f44f2a7a6a5a342fd226c704bfe5e
SHA256ec4903fa9c9b90dc8bb3a3574a70d3895da6c5eda36f0711e85bcead78b463ac
SHA512366127f54af28656953eebc4a89f8b911a52652e7543f112c7cb3ccdda79abf41ba213169469a8c3d46a8cd44da2e34ca6bfb6cb758bc4903a6c2841b0aa0658
-
\Users\Admin\AppData\Local\d391c44d-586d-4973-8f66-eef2a2d5ace8\build3.exeFilesize
78KB
MD53b6b7a1e87bbebb7b66a43a33b83c5af
SHA1f63a66091a566f04b9191811c829a4e0bd121075
SHA256de251099712e85c528de62879ba7c0cf39c2473c2e2999bf735ba247481fd3c6
SHA512012fc4eeca37bac4f4ba4cfb44435ab632b7bad8a9681ee8f83357ac0bc6224165031d78fe87722bb276b7dcde21ef45a04774834f768a2df9129f4e54ad8567
-
\Users\Admin\AppData\Local\d391c44d-586d-4973-8f66-eef2a2d5ace8\build3.exeFilesize
100KB
MD52688e273a24badc6b4698393547faa7b
SHA1fa8f984721e0cf60d90dd5721a4cd496fd8e1f1d
SHA2561d3ec86ea484779dece0e5928ca6b543b198fa414ca576d4820da60732955754
SHA512691224851b0def96b55df6183c3fcff15018bb701960d3fbd7e1b4f4ae4f341ec70d8195489d2cefc0cd4fe5b3bd79dd826867f7699ad175c964200c7279af9b
-
memory/488-304-0x0000000000C50000-0x0000000000D50000-memory.dmpFilesize
1024KB
-
memory/1176-274-0x0000000000972000-0x0000000000982000-memory.dmpFilesize
64KB
-
memory/1648-205-0x00000000001B0000-0x00000000001B4000-memory.dmpFilesize
16KB
-
memory/1648-204-0x0000000000332000-0x0000000000343000-memory.dmpFilesize
68KB
-
memory/1648-259-0x00000000001B0000-0x00000000001B4000-memory.dmpFilesize
16KB
-
memory/1720-0-0x0000000000220000-0x00000000002B2000-memory.dmpFilesize
584KB
-
memory/1720-5-0x0000000001E20000-0x0000000001F3B000-memory.dmpFilesize
1.1MB
-
memory/1720-6-0x0000000000220000-0x00000000002B2000-memory.dmpFilesize
584KB
-
memory/1720-254-0x0000000000220000-0x00000000002B2000-memory.dmpFilesize
584KB
-
memory/1900-327-0x0000000000980000-0x0000000000A80000-memory.dmpFilesize
1024KB
-
memory/2044-208-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/2044-201-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/2044-206-0x0000000000400000-0x0000000000406000-memory.dmpFilesize
24KB
-
memory/2044-199-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2164-7-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2164-3-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2164-8-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2164-1-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2164-44-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2448-74-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2448-76-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2448-53-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2448-100-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2448-77-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2448-158-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2448-70-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2448-69-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2448-52-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/2684-91-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2684-255-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/2684-99-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/2684-93-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/2684-98-0x0000000000400000-0x0000000000643000-memory.dmpFilesize
2.3MB
-
memory/2720-359-0x0000000000270000-0x0000000000370000-memory.dmpFilesize
1024KB
-
memory/2760-47-0x0000000000330000-0x00000000003C2000-memory.dmpFilesize
584KB
-
memory/2760-45-0x0000000000330000-0x00000000003C2000-memory.dmpFilesize
584KB
-
memory/2808-96-0x0000000000230000-0x0000000000260000-memory.dmpFilesize
192KB
-
memory/2808-257-0x0000000000230000-0x0000000000260000-memory.dmpFilesize
192KB
-
memory/2808-94-0x00000000008B0000-0x00000000009B0000-memory.dmpFilesize
1024KB