Resubmissions
12-04-2024 14:13
240412-rjrz5aba72 812-04-2024 14:12
240412-rh8aqaba68 712-04-2024 14:05
240412-rd9mzsea7x 812-04-2024 14:05
240412-rd82fsea7v 812-04-2024 14:05
240412-rd8exsea7t 809-04-2024 07:05
240409-hws9aacd6z 809-04-2024 07:05
240409-hwljfacd6x 809-04-2024 07:04
240409-hwbz1acd6t 809-04-2024 07:03
240409-hvcvxacd3y 815-01-2024 20:15
240115-y1q8gsfdf2 7Analysis
-
max time kernel
599s -
max time network
605s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
09-04-2024 07:04
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
tmp.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
tmp.exe
Resource
win11-20240221-en
General
-
Target
tmp.exe
-
Size
9.4MB
-
MD5
db3edf03a8a2c8e96fe2d2deaaec76ff
-
SHA1
2d9c9f3a5d06f11c5c881a9df90ba33cc2894ac1
-
SHA256
a40cac0b6ee1729cdb6fca3c950e533b913c2729afbd2fde045e86cc62c0ff60
-
SHA512
121b6ba2c7a91a8639b4b88d9965528df245534ec65c4f1d463dbcc3aa2719debb4417a1a7d919527155097cc00521576b25b2d061b149d0c8b82ca999054135
-
SSDEEP
98304:kT2OhoLUWeKqyubAguIYylB9RK0RU4lFp887VO0J/yLaeWwGvJldmxe:VOE/IYypvU4loRpK
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 10 IoCs
Processes:
netsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exenetsh.exepid process 4836 netsh.exe 3276 netsh.exe 304 netsh.exe 2996 netsh.exe 4724 netsh.exe 4092 netsh.exe 4052 netsh.exe 4476 netsh.exe 2400 netsh.exe 60 netsh.exe -
Executes dropped EXE 6 IoCs
Processes:
svchost.exe~tl3CDD.tmpsvchost.exe~tl2316.tmpsvchost.exe~tlA48B.tmppid process 3916 svchost.exe 4940 ~tl3CDD.tmp 2116 svchost.exe 4312 ~tl2316.tmp 2220 svchost.exe 3340 ~tlA48B.tmp -
Drops file in System32 directory 10 IoCs
Processes:
svchost.exe~tlA48B.tmppowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat ~tlA48B.tmp File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[1].htm svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\output1[1].jpg svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE\getlog[1].htm ~tlA48B.tmp -
Drops file in Windows directory 8 IoCs
Processes:
~tl3CDD.tmpsvchost.exesvchost.exetmp.exesvchost.exedescription ioc process File created C:\Windows\System\xxx1.bak ~tl3CDD.tmp File opened for modification C:\Windows\System\svchost.exe ~tl3CDD.tmp File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak tmp.exe File created C:\Windows\System\svchost.exe tmp.exe File opened for modification C:\Windows\System\svchost.exe tmp.exe File created C:\Windows\System\xxx1.bak svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2212 schtasks.exe 3048 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exe~tlA48B.tmpnetsh.exenetsh.exenetsh.exesvchost.exenetsh.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" ~tlA48B.tmp Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" ~tlA48B.tmp Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\NetTrace\Session netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\NetTrace\Session netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\NetTrace\Session netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" ~tlA48B.tmp Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\NetTrace\Session netsh.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
Processes:
powershell.exepowershell.exetmp.exepowershell.exepowershell.exe~tl3CDD.tmppowershell.exepowershell.exesvchost.exepowershell.exepowershell.exe~tl2316.tmppowershell.exepowershell.exesvchost.exepowershell.exepowershell.exe~tlA48B.tmppowershell.exepowershell.exepid process 3636 powershell.exe 3636 powershell.exe 3636 powershell.exe 1536 powershell.exe 1536 powershell.exe 1536 powershell.exe 4832 tmp.exe 4832 tmp.exe 4800 powershell.exe 4800 powershell.exe 4800 powershell.exe 3396 powershell.exe 3396 powershell.exe 3396 powershell.exe 4940 ~tl3CDD.tmp 4940 ~tl3CDD.tmp 2876 powershell.exe 2876 powershell.exe 1748 powershell.exe 1748 powershell.exe 2876 powershell.exe 1748 powershell.exe 4940 ~tl3CDD.tmp 4940 ~tl3CDD.tmp 2116 svchost.exe 2116 svchost.exe 5060 powershell.exe 5060 powershell.exe 5060 powershell.exe 3076 powershell.exe 3076 powershell.exe 3076 powershell.exe 4312 ~tl2316.tmp 4312 ~tl2316.tmp 1800 powershell.exe 1800 powershell.exe 3644 powershell.exe 3644 powershell.exe 1800 powershell.exe 3644 powershell.exe 2220 svchost.exe 2220 svchost.exe 620 powershell.exe 2092 powershell.exe 620 powershell.exe 2092 powershell.exe 620 powershell.exe 2092 powershell.exe 3340 ~tlA48B.tmp 3340 ~tlA48B.tmp 1156 powershell.exe 1156 powershell.exe 2320 powershell.exe 1156 powershell.exe 2320 powershell.exe 2320 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 3636 powershell.exe Token: SeDebugPrivilege 1536 powershell.exe Token: SeIncreaseQuotaPrivilege 3636 powershell.exe Token: SeSecurityPrivilege 3636 powershell.exe Token: SeTakeOwnershipPrivilege 3636 powershell.exe Token: SeLoadDriverPrivilege 3636 powershell.exe Token: SeSystemProfilePrivilege 3636 powershell.exe Token: SeSystemtimePrivilege 3636 powershell.exe Token: SeProfSingleProcessPrivilege 3636 powershell.exe Token: SeIncBasePriorityPrivilege 3636 powershell.exe Token: SeCreatePagefilePrivilege 3636 powershell.exe Token: SeBackupPrivilege 3636 powershell.exe Token: SeRestorePrivilege 3636 powershell.exe Token: SeShutdownPrivilege 3636 powershell.exe Token: SeDebugPrivilege 3636 powershell.exe Token: SeSystemEnvironmentPrivilege 3636 powershell.exe Token: SeRemoteShutdownPrivilege 3636 powershell.exe Token: SeUndockPrivilege 3636 powershell.exe Token: SeManageVolumePrivilege 3636 powershell.exe Token: 33 3636 powershell.exe Token: 34 3636 powershell.exe Token: 35 3636 powershell.exe Token: 36 3636 powershell.exe Token: SeDebugPrivilege 4800 powershell.exe Token: SeDebugPrivilege 3396 powershell.exe Token: SeIncreaseQuotaPrivilege 4800 powershell.exe Token: SeSecurityPrivilege 4800 powershell.exe Token: SeTakeOwnershipPrivilege 4800 powershell.exe Token: SeLoadDriverPrivilege 4800 powershell.exe Token: SeSystemProfilePrivilege 4800 powershell.exe Token: SeSystemtimePrivilege 4800 powershell.exe Token: SeProfSingleProcessPrivilege 4800 powershell.exe Token: SeIncBasePriorityPrivilege 4800 powershell.exe Token: SeCreatePagefilePrivilege 4800 powershell.exe Token: SeBackupPrivilege 4800 powershell.exe Token: SeRestorePrivilege 4800 powershell.exe Token: SeShutdownPrivilege 4800 powershell.exe Token: SeDebugPrivilege 4800 powershell.exe Token: SeSystemEnvironmentPrivilege 4800 powershell.exe Token: SeRemoteShutdownPrivilege 4800 powershell.exe Token: SeUndockPrivilege 4800 powershell.exe Token: SeManageVolumePrivilege 4800 powershell.exe Token: 33 4800 powershell.exe Token: 34 4800 powershell.exe Token: 35 4800 powershell.exe Token: 36 4800 powershell.exe Token: SeDebugPrivilege 2876 powershell.exe Token: SeDebugPrivilege 1748 powershell.exe Token: SeIncreaseQuotaPrivilege 2876 powershell.exe Token: SeSecurityPrivilege 2876 powershell.exe Token: SeTakeOwnershipPrivilege 2876 powershell.exe Token: SeLoadDriverPrivilege 2876 powershell.exe Token: SeSystemProfilePrivilege 2876 powershell.exe Token: SeSystemtimePrivilege 2876 powershell.exe Token: SeProfSingleProcessPrivilege 2876 powershell.exe Token: SeIncBasePriorityPrivilege 2876 powershell.exe Token: SeCreatePagefilePrivilege 2876 powershell.exe Token: SeBackupPrivilege 2876 powershell.exe Token: SeRestorePrivilege 2876 powershell.exe Token: SeShutdownPrivilege 2876 powershell.exe Token: SeDebugPrivilege 2876 powershell.exe Token: SeSystemEnvironmentPrivilege 2876 powershell.exe Token: SeRemoteShutdownPrivilege 2876 powershell.exe Token: SeUndockPrivilege 2876 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
tmp.exesvchost.exe~tl3CDD.tmpsvchost.exe~tl2316.tmpsvchost.exedescription pid process target process PID 4832 wrote to memory of 3636 4832 tmp.exe powershell.exe PID 4832 wrote to memory of 3636 4832 tmp.exe powershell.exe PID 4832 wrote to memory of 1536 4832 tmp.exe powershell.exe PID 4832 wrote to memory of 1536 4832 tmp.exe powershell.exe PID 4832 wrote to memory of 812 4832 tmp.exe schtasks.exe PID 4832 wrote to memory of 812 4832 tmp.exe schtasks.exe PID 4832 wrote to memory of 2212 4832 tmp.exe schtasks.exe PID 4832 wrote to memory of 2212 4832 tmp.exe schtasks.exe PID 4832 wrote to memory of 3916 4832 tmp.exe svchost.exe PID 4832 wrote to memory of 3916 4832 tmp.exe svchost.exe PID 3916 wrote to memory of 4800 3916 svchost.exe powershell.exe PID 3916 wrote to memory of 4800 3916 svchost.exe powershell.exe PID 3916 wrote to memory of 3396 3916 svchost.exe powershell.exe PID 3916 wrote to memory of 3396 3916 svchost.exe powershell.exe PID 3916 wrote to memory of 4940 3916 svchost.exe ~tl3CDD.tmp PID 3916 wrote to memory of 4940 3916 svchost.exe ~tl3CDD.tmp PID 4940 wrote to memory of 1460 4940 ~tl3CDD.tmp netsh.exe PID 4940 wrote to memory of 1460 4940 ~tl3CDD.tmp netsh.exe PID 4940 wrote to memory of 304 4940 ~tl3CDD.tmp netsh.exe PID 4940 wrote to memory of 304 4940 ~tl3CDD.tmp netsh.exe PID 4940 wrote to memory of 4476 4940 ~tl3CDD.tmp netsh.exe PID 4940 wrote to memory of 4476 4940 ~tl3CDD.tmp netsh.exe PID 4940 wrote to memory of 2876 4940 ~tl3CDD.tmp powershell.exe PID 4940 wrote to memory of 2876 4940 ~tl3CDD.tmp powershell.exe PID 4940 wrote to memory of 1748 4940 ~tl3CDD.tmp powershell.exe PID 4940 wrote to memory of 1748 4940 ~tl3CDD.tmp powershell.exe PID 4940 wrote to memory of 2444 4940 ~tl3CDD.tmp schtasks.exe PID 4940 wrote to memory of 2444 4940 ~tl3CDD.tmp schtasks.exe PID 4940 wrote to memory of 3048 4940 ~tl3CDD.tmp schtasks.exe PID 4940 wrote to memory of 3048 4940 ~tl3CDD.tmp schtasks.exe PID 4940 wrote to memory of 2116 4940 ~tl3CDD.tmp svchost.exe PID 4940 wrote to memory of 2116 4940 ~tl3CDD.tmp svchost.exe PID 2116 wrote to memory of 8 2116 svchost.exe netsh.exe PID 2116 wrote to memory of 8 2116 svchost.exe netsh.exe PID 2116 wrote to memory of 2996 2116 svchost.exe netsh.exe PID 2116 wrote to memory of 2996 2116 svchost.exe netsh.exe PID 2116 wrote to memory of 2400 2116 svchost.exe netsh.exe PID 2116 wrote to memory of 2400 2116 svchost.exe netsh.exe PID 2116 wrote to memory of 5060 2116 svchost.exe powershell.exe PID 2116 wrote to memory of 5060 2116 svchost.exe powershell.exe PID 2116 wrote to memory of 3076 2116 svchost.exe powershell.exe PID 2116 wrote to memory of 3076 2116 svchost.exe powershell.exe PID 2116 wrote to memory of 4312 2116 svchost.exe ~tl2316.tmp PID 2116 wrote to memory of 4312 2116 svchost.exe ~tl2316.tmp PID 4312 wrote to memory of 3672 4312 ~tl2316.tmp netsh.exe PID 4312 wrote to memory of 3672 4312 ~tl2316.tmp netsh.exe PID 4312 wrote to memory of 60 4312 ~tl2316.tmp netsh.exe PID 4312 wrote to memory of 60 4312 ~tl2316.tmp netsh.exe PID 4312 wrote to memory of 4724 4312 ~tl2316.tmp netsh.exe PID 4312 wrote to memory of 4724 4312 ~tl2316.tmp netsh.exe PID 4312 wrote to memory of 1800 4312 ~tl2316.tmp powershell.exe PID 4312 wrote to memory of 1800 4312 ~tl2316.tmp powershell.exe PID 4312 wrote to memory of 3644 4312 ~tl2316.tmp powershell.exe PID 4312 wrote to memory of 3644 4312 ~tl2316.tmp powershell.exe PID 2220 wrote to memory of 4056 2220 svchost.exe netsh.exe PID 2220 wrote to memory of 4056 2220 svchost.exe netsh.exe PID 2220 wrote to memory of 4092 2220 svchost.exe netsh.exe PID 2220 wrote to memory of 4092 2220 svchost.exe netsh.exe PID 2220 wrote to memory of 4052 2220 svchost.exe netsh.exe PID 2220 wrote to memory of 4052 2220 svchost.exe netsh.exe PID 2220 wrote to memory of 2092 2220 svchost.exe powershell.exe PID 2220 wrote to memory of 2092 2220 svchost.exe powershell.exe PID 2220 wrote to memory of 620 2220 svchost.exe powershell.exe PID 2220 wrote to memory of 620 2220 svchost.exe powershell.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /TN "Timer"2⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM2⤵
- Creates scheduled task(s)
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\~tl3CDD.tmpC:\Users\Admin\AppData\Local\Temp\~tl3CDD.tmp3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645114⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
- Modifies Windows Firewall
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
- Modifies Windows Firewall
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /TN "Timer"4⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM4⤵
- Creates scheduled task(s)
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645115⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes5⤵
- Modifies Windows Firewall
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes5⤵
- Modifies Windows Firewall
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\5⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \5⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\~tl2316.tmpC:\Users\Admin\AppData\Local\Temp\~tl2316.tmp5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645116⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes6⤵
- Modifies Windows Firewall
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes6⤵
- Modifies Windows Firewall
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\6⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \6⤵
- Suspicious behavior: EnumeratesProcesses
-
\??\c:\windows\system\svchost.exec:\windows\system\svchost.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645112⤵
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\TEMP\~tlA48B.tmpC:\Windows\TEMP\~tlA48B.tmp2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645113⤵
- Modifies data under HKEY_USERS
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
- Modifies data under HKEY_USERS
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5af500f13a4d59084f0304e761c3c38ab
SHA1528462e5dc80e8b7143656ca03f6ddd2300ea9c4
SHA25680f6adb1de0d700b09a304bf05c9ca59021ea27bcf362fbe558bace7dbabbf08
SHA5125abafb125f25453931349f143b771e797a0d0f9ba77322f51e60f167a6ba562e25611890f4a340ff155207f3a3736093e9cae33492758378ed21115b9a690a99
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5dfd512a8c5859bed6919bba7cb6dd958
SHA13f9f582bc02ba768e69cbdf777c43fdb185d4c83
SHA2564e18cde8a270e6e163694c828a88950c2b6e11baeca8095dde44144b96a625fd
SHA51246f48a214d5f1cc60b767c4685af5bf7949375388b670823ed628f55cb11617fc61e884b925df7e498a51befc114e8459a9d29bf8a01ec6242cabf0dad96a1b4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5fd481d829fde5903f507c3604c97b9f0
SHA13d5a6868b3971e2d25f58ceb60dcc3ecb5f153ab
SHA2565545b5d1895c07a310b4bf04c1e1a780dc559acfa8a9d86344c163a554c3c565
SHA5128c362d3d4ced6f965adff3c4aa448d8e378a1b76cc76c4a9c9fd5788adf3761679404f2f66bdfce50554722a52f963ff81476ef791e57ce380f409842b4e0fb2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD55989952a84a41a66bc4919e86daae2d7
SHA1315689f33a1ac3e1639e1543a9963ba5a74a9727
SHA256c6a84da6c4c714df4813875e7f0823895ccc9bf661a80b0c2b51fb98634e3514
SHA51235d83353c24164195872ff907a3e45b48f8bd8515b76a7370bdf5249a81be4240674a7e9cac90600bf5a0c34ff1eca321c5f851f570706fbb0cdb3da6212735e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD53ab7821c216593f561c8124ee80aa01c
SHA19d014ddb9d72496f0f36f5091b8a10ca7ca408cb
SHA25656244103eb19c1bedf7bd21ade2328d4b9fd1474cafb5c7d53fbd44aa10f2d65
SHA512de57082c189520d6ff5c7d067fb4f948a285f304dd56985a8e5d5e330428daa4e4314d22c2d27b6b4a2c00c18a744b1e3f4afff11f34ae387a9eff40cf923f00
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0ulrev2f.zdi.ps1Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\Users\Admin\AppData\Local\Temp\~tl2316.tmpFilesize
393KB
MD59dbdd43a2e0b032604943c252eaf634a
SHA19584dc66f3c1cce4210fdf827a1b4e2bb22263af
SHA25633c53cd5265502e7b62432dba0e1b5ed702b5007cc79973ccd1e71b2acc01e86
SHA512b7b20b06dac952a96eda254bad29966fe7a4f827912beb0bc66d5af5b302d7c0282d70c1b01ff782507dd03a1d58706f05cb157521c7f2887a43085ffe5f94d1
-
C:\Users\Admin\AppData\Local\Temp\~tl3CDD.tmpFilesize
385KB
MD5e802c96760e48c5139995ffb2d891f90
SHA1bba3d278c0eb1094a26e5d2f4c099ad685371578
SHA256cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c
SHA51297300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0
-
C:\Windows\System\svchost.exeFilesize
9.4MB
MD5db3edf03a8a2c8e96fe2d2deaaec76ff
SHA12d9c9f3a5d06f11c5c881a9df90ba33cc2894ac1
SHA256a40cac0b6ee1729cdb6fca3c950e533b913c2729afbd2fde045e86cc62c0ff60
SHA512121b6ba2c7a91a8639b4b88d9965528df245534ec65c4f1d463dbcc3aa2719debb4417a1a7d919527155097cc00521576b25b2d061b149d0c8b82ca999054135
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5478f1c1fcff584f4f440469ed71d2d43
SHA10900e9dc39580d527c145715f985a5a86e80b66c
SHA256c918bf6bad93b653f9d05007634b088be7b91ed4350b777905d0520d93d650eb
SHA5124ed62f2add77e0dd8e07e101ee06bdb8a15808b701c7580b09704bd4befdecf7cfe2fa29d6e96f2149a92f4e1b0cae0d9810a5cde3f4940145f8120f7322d1a7
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5f8697ab13449f1dd15f9c5990a8e0db7
SHA174975f068982576ce7d67f8ad3785f12d0bc8e5f
SHA25653ea421a89225f45b8d979af2973a9235ca92cd022622c9f548ddb1bfd1aa264
SHA5125b95a3c883c2a56b8c2b84c299a44a186a11374c4451726f4ca92c6e34f34a44eeb38b06f3722169f98d1803f79310b7be9ed0ac23d05c7e1ae1b4c0174a4770
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5631f4b3792b263fdda6b265e93be4747
SHA11d6916097d419198bfdf78530d59d0d9f3e12d45
SHA2564e68d2d067c5680a2e55853ac58b16f199b09f1b9e5f2174605fff18da828976
SHA512e0280041c4ca63971ab2524f25d2047820f031c1b4aeb6021a3367297045ddf6616ffccafb54630eb07fd154571d844329ebcc34d6ce64834cb77cba373e4fbe
-
memory/1536-111-0x00007FFB2F260000-0x00007FFB2FC4C000-memory.dmpFilesize
9.9MB
-
memory/1536-45-0x00007FFB2F260000-0x00007FFB2FC4C000-memory.dmpFilesize
9.9MB
-
memory/1536-52-0x000001EE6DEB0000-0x000001EE6DEC0000-memory.dmpFilesize
64KB
-
memory/1536-53-0x000001EE6DEB0000-0x000001EE6DEC0000-memory.dmpFilesize
64KB
-
memory/1536-72-0x000001EE6DEB0000-0x000001EE6DEC0000-memory.dmpFilesize
64KB
-
memory/1536-105-0x000001EE6DEB0000-0x000001EE6DEC0000-memory.dmpFilesize
64KB
-
memory/1748-413-0x00007FFB2F260000-0x00007FFB2FC4C000-memory.dmpFilesize
9.9MB
-
memory/1748-329-0x000001DED23D0000-0x000001DED23E0000-memory.dmpFilesize
64KB
-
memory/1748-326-0x00007FFB2F260000-0x00007FFB2FC4C000-memory.dmpFilesize
9.9MB
-
memory/1748-330-0x000001DED23D0000-0x000001DED23E0000-memory.dmpFilesize
64KB
-
memory/1748-371-0x000001DED23D0000-0x000001DED23E0000-memory.dmpFilesize
64KB
-
memory/1748-408-0x000001DED23D0000-0x000001DED23E0000-memory.dmpFilesize
64KB
-
memory/1800-556-0x00007FFB2F260000-0x00007FFB2FC4C000-memory.dmpFilesize
9.9MB
-
memory/2116-429-0x0000000140000000-0x000000014015E400-memory.dmpFilesize
1.4MB
-
memory/2116-432-0x0000000140000000-0x000000014015E400-memory.dmpFilesize
1.4MB
-
memory/2116-543-0x0000000140000000-0x000000014015E400-memory.dmpFilesize
1.4MB
-
memory/2220-982-0x0000000140000000-0x000000014015E400-memory.dmpFilesize
1.4MB
-
memory/2220-552-0x0000000140000000-0x000000014015E400-memory.dmpFilesize
1.4MB
-
memory/2220-550-0x0000000140000000-0x000000014015E400-memory.dmpFilesize
1.4MB
-
memory/2876-422-0x00007FFB2F260000-0x00007FFB2FC4C000-memory.dmpFilesize
9.9MB
-
memory/2876-357-0x0000025CCBED0000-0x0000025CCBEE0000-memory.dmpFilesize
64KB
-
memory/2876-321-0x0000025CCBED0000-0x0000025CCBEE0000-memory.dmpFilesize
64KB
-
memory/2876-322-0x0000025CCBED0000-0x0000025CCBEE0000-memory.dmpFilesize
64KB
-
memory/2876-320-0x00007FFB2F260000-0x00007FFB2FC4C000-memory.dmpFilesize
9.9MB
-
memory/2876-414-0x0000025CCBED0000-0x0000025CCBEE0000-memory.dmpFilesize
64KB
-
memory/3076-527-0x0000020447870000-0x0000020447880000-memory.dmpFilesize
64KB
-
memory/3076-445-0x00007FFB2F260000-0x00007FFB2FC4C000-memory.dmpFilesize
9.9MB
-
memory/3076-533-0x00007FFB2F260000-0x00007FFB2FC4C000-memory.dmpFilesize
9.9MB
-
memory/3076-493-0x0000020447870000-0x0000020447880000-memory.dmpFilesize
64KB
-
memory/3076-457-0x0000020447870000-0x0000020447880000-memory.dmpFilesize
64KB
-
memory/3076-456-0x0000020447870000-0x0000020447880000-memory.dmpFilesize
64KB
-
memory/3340-1305-0x0000000140000000-0x0000000140170400-memory.dmpFilesize
1.4MB
-
memory/3340-1303-0x0000000140000000-0x0000000140170400-memory.dmpFilesize
1.4MB
-
memory/3340-986-0x0000000140000000-0x0000000140170400-memory.dmpFilesize
1.4MB
-
memory/3396-161-0x00007FFB2F260000-0x00007FFB2FC4C000-memory.dmpFilesize
9.9MB
-
memory/3396-225-0x00007FFB2F260000-0x00007FFB2FC4C000-memory.dmpFilesize
9.9MB
-
memory/3396-221-0x000001D46F490000-0x000001D46F4A0000-memory.dmpFilesize
64KB
-
memory/3396-194-0x000001D46F490000-0x000001D46F4A0000-memory.dmpFilesize
64KB
-
memory/3396-166-0x000001D46F490000-0x000001D46F4A0000-memory.dmpFilesize
64KB
-
memory/3396-167-0x000001D46F490000-0x000001D46F4A0000-memory.dmpFilesize
64KB
-
memory/3636-14-0x00007FFB2F260000-0x00007FFB2FC4C000-memory.dmpFilesize
9.9MB
-
memory/3636-106-0x00007FFB2F260000-0x00007FFB2FC4C000-memory.dmpFilesize
9.9MB
-
memory/3636-15-0x00000288E91A0000-0x00000288E91B0000-memory.dmpFilesize
64KB
-
memory/3636-16-0x00000288E92B0000-0x00000288E9326000-memory.dmpFilesize
472KB
-
memory/3636-17-0x00000288E91A0000-0x00000288E91B0000-memory.dmpFilesize
64KB
-
memory/3636-30-0x00000288E91A0000-0x00000288E91B0000-memory.dmpFilesize
64KB
-
memory/3636-101-0x00000288E91A0000-0x00000288E91B0000-memory.dmpFilesize
64KB
-
memory/3636-11-0x00000288E90F0000-0x00000288E9112000-memory.dmpFilesize
136KB
-
memory/3916-120-0x0000000140000000-0x0000000140A64400-memory.dmpFilesize
10.4MB
-
memory/3916-314-0x0000000140000000-0x0000000140A64400-memory.dmpFilesize
10.4MB
-
memory/3916-226-0x0000000180000000-0x000000018070E000-memory.dmpFilesize
7.1MB
-
memory/3916-123-0x0000000140000000-0x0000000140A64400-memory.dmpFilesize
10.4MB
-
memory/4312-985-0x0000000140000000-0x0000000140170400-memory.dmpFilesize
1.4MB
-
memory/4312-974-0x0000000140000000-0x0000000140170400-memory.dmpFilesize
1.4MB
-
memory/4312-551-0x0000000140000000-0x0000000140170400-memory.dmpFilesize
1.4MB
-
memory/4312-546-0x0000000140000000-0x0000000140170400-memory.dmpFilesize
1.4MB
-
memory/4312-545-0x0000000140000000-0x0000000140170400-memory.dmpFilesize
1.4MB
-
memory/4312-542-0x0000000140000000-0x0000000140170400-memory.dmpFilesize
1.4MB
-
memory/4800-178-0x00000253F3940000-0x00000253F3950000-memory.dmpFilesize
64KB
-
memory/4800-128-0x00007FFB2F260000-0x00007FFB2FC4C000-memory.dmpFilesize
9.9MB
-
memory/4800-146-0x00000253F3940000-0x00000253F3950000-memory.dmpFilesize
64KB
-
memory/4800-130-0x00000253F3940000-0x00000253F3950000-memory.dmpFilesize
64KB
-
memory/4800-129-0x00000253F3940000-0x00000253F3950000-memory.dmpFilesize
64KB
-
memory/4800-190-0x00007FFB2F260000-0x00007FFB2FC4C000-memory.dmpFilesize
9.9MB
-
memory/4832-9-0x0000000140000000-0x0000000140A64400-memory.dmpFilesize
10.4MB
-
memory/4832-4-0x0000000140000000-0x0000000140A64400-memory.dmpFilesize
10.4MB
-
memory/4832-121-0x0000000140000000-0x0000000140A64400-memory.dmpFilesize
10.4MB
-
memory/4832-0-0x0000000140000000-0x0000000140A64400-memory.dmpFilesize
10.4MB
-
memory/4832-1-0x0000000140000000-0x0000000140A64400-memory.dmpFilesize
10.4MB
-
memory/4832-2-0x0000000140000000-0x0000000140A64400-memory.dmpFilesize
10.4MB
-
memory/4832-3-0x0000000140000000-0x0000000140A64400-memory.dmpFilesize
10.4MB
-
memory/4940-302-0x0000000140000000-0x000000014015E400-memory.dmpFilesize
1.4MB
-
memory/4940-315-0x0000000140000000-0x000000014015E400-memory.dmpFilesize
1.4MB
-
memory/4940-431-0x0000000140000000-0x000000014015E400-memory.dmpFilesize
1.4MB
-
memory/4940-303-0x0000000140000000-0x000000014015E400-memory.dmpFilesize
1.4MB
-
memory/4940-300-0x0000000140000000-0x000000014015E400-memory.dmpFilesize
1.4MB
-
memory/4940-301-0x0000000140000000-0x000000014015E400-memory.dmpFilesize
1.4MB
-
memory/5060-463-0x000001F033C40000-0x000001F033C50000-memory.dmpFilesize
64KB
-
memory/5060-439-0x000001F033C40000-0x000001F033C50000-memory.dmpFilesize
64KB
-
memory/5060-534-0x00007FFB2F260000-0x00007FFB2FC4C000-memory.dmpFilesize
9.9MB
-
memory/5060-438-0x000001F033C40000-0x000001F033C50000-memory.dmpFilesize
64KB
-
memory/5060-520-0x000001F033C40000-0x000001F033C50000-memory.dmpFilesize
64KB
-
memory/5060-436-0x00007FFB2F260000-0x00007FFB2FC4C000-memory.dmpFilesize
9.9MB