Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-04-2024 17:55
Static task
static1
Behavioral task
behavioral1
Sample
bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe
Resource
win10v2004-20240419-en
General
-
Target
bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe
-
Size
4.2MB
-
MD5
42fdcd52e07ef84b87b95ce44263b604
-
SHA1
7d121559c9f918b35e4ab85b837050f902700c19
-
SHA256
bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11
-
SHA512
2fc0e6516ce8673a24e6176977a6d05ea3f2daf248050ebd9c81d04d700c7a9ba036d8b5913638f4eaa3013bd456db1840ed1ae6e3c6d8c572ae90f5c5e96266
-
SSDEEP
49152:cCifvx7B+7FOLxQ63IeExjZRrV5rQg00XFP5L9XkQs+hWJEWJawvScCFBuiQf8Kq:cCk8+Qet2rTQI1P5Je65g2FBuWsCvPbf
Malware Config
Signatures
-
Glupteba payload 19 IoCs
Processes:
resource yara_rule behavioral2/memory/1796-2-0x0000000006550000-0x0000000006E3B000-memory.dmp family_glupteba behavioral2/memory/1796-3-0x0000000000400000-0x0000000004420000-memory.dmp family_glupteba behavioral2/memory/1796-51-0x0000000000400000-0x0000000004420000-memory.dmp family_glupteba behavioral2/memory/1796-52-0x0000000006550000-0x0000000006E3B000-memory.dmp family_glupteba behavioral2/memory/2676-120-0x0000000000400000-0x0000000004420000-memory.dmp family_glupteba behavioral2/memory/2676-127-0x0000000000400000-0x0000000004420000-memory.dmp family_glupteba behavioral2/memory/2636-153-0x0000000000400000-0x0000000004420000-memory.dmp family_glupteba behavioral2/memory/2636-199-0x0000000000400000-0x0000000004420000-memory.dmp family_glupteba behavioral2/memory/2636-206-0x0000000000400000-0x0000000004420000-memory.dmp family_glupteba behavioral2/memory/2636-207-0x0000000000400000-0x0000000004420000-memory.dmp family_glupteba behavioral2/memory/2636-208-0x0000000000400000-0x0000000004420000-memory.dmp family_glupteba behavioral2/memory/2636-209-0x0000000000400000-0x0000000004420000-memory.dmp family_glupteba behavioral2/memory/2636-210-0x0000000000400000-0x0000000004420000-memory.dmp family_glupteba behavioral2/memory/2636-211-0x0000000000400000-0x0000000004420000-memory.dmp family_glupteba behavioral2/memory/2636-212-0x0000000000400000-0x0000000004420000-memory.dmp family_glupteba behavioral2/memory/2636-213-0x0000000000400000-0x0000000004420000-memory.dmp family_glupteba behavioral2/memory/2636-214-0x0000000000400000-0x0000000004420000-memory.dmp family_glupteba behavioral2/memory/2636-215-0x0000000000400000-0x0000000004420000-memory.dmp family_glupteba behavioral2/memory/2636-216-0x0000000000400000-0x0000000004420000-memory.dmp family_glupteba -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 1404 netsh.exe -
Executes dropped EXE 2 IoCs
Processes:
csrss.exeinjector.exepid process 2636 csrss.exe 3872 injector.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
csrss.exebb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" csrss.exe Set value (str) \REGISTRY\USER\S-1-5-21-293923083-2364846840-4256557006-1000\Software\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\rss\\csrss.exe\"" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Manipulates WinMonFS driver. 1 IoCs
Roottkits write to WinMonFS to hide directories/files from being detected.
Processes:
csrss.exedescription ioc process File opened for modification \??\WinMonFS csrss.exe -
Drops file in System32 directory 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive powershell.exe -
Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs
Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.
Processes:
bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exedescription ioc process File opened (read-only) \??\VBoxMiniRdrDN bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe -
Drops file in Windows directory 2 IoCs
Processes:
bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exedescription ioc process File opened for modification C:\Windows\rss bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe File created C:\Windows\rss\csrss.exe bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2560 1796 WerFault.exe bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe 2520 2676 WerFault.exe bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2464 schtasks.exe 1920 schtasks.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription ioc process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2341 = "Haiti Daylight Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-742 = "New Zealand Standard Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2161 = "Altai Daylight Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-112 = "Eastern Standard Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-371 = "Jerusalem Daylight Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-931 = "Coordinated Universal Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-382 = "South Africa Standard Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2612 = "Bougainville Standard Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2511 = "Lord Howe Daylight Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-752 = "Tonga Standard Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-181 = "Mountain Daylight Time (Mexico)" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-532 = "Sri Lanka Standard Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2142 = "Transbaikal Standard Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2942 = "Sao Tome Standard Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2752 = "Tomsk Standard Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-841 = "Argentina Daylight Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-232 = "Hawaiian Standard Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-191 = "Mountain Daylight Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-384 = "Namibia Daylight Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-362 = "GTB Standard Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2631 = "Norfolk Daylight Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2061 = "North Korea Daylight Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-131 = "US Eastern Daylight Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-671 = "AUS Eastern Daylight Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-302 = "Romance Standard Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2322 = "Sakhalin Standard Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-462 = "Afghanistan Standard Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1912 = "Russia TZ 10 Standard Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1502 = "Turkey Standard Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1892 = "Russia TZ 3 Standard Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2531 = "Chatham Islands Daylight Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-52 = "Greenland Standard Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-231 = "Hawaiian Daylight Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-1471 = "Magadan Daylight Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-214 = "Pacific Daylight Time (Mexico)" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32\,@tzres.dll,-2592 = "Tocantins Standard Time" bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exebb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exepowershell.exebb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeinjector.execsrss.exepid process 5060 powershell.exe 5060 powershell.exe 1796 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe 1796 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe 4308 powershell.exe 4308 powershell.exe 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe 3480 powershell.exe 3480 powershell.exe 3084 powershell.exe 3084 powershell.exe 4484 powershell.exe 4484 powershell.exe 2152 powershell.exe 2152 powershell.exe 4808 powershell.exe 4808 powershell.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 2636 csrss.exe 2636 csrss.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 2636 csrss.exe 2636 csrss.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe 3872 injector.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
powershell.exebb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execsrss.exedescription pid process Token: SeDebugPrivilege 5060 powershell.exe Token: SeDebugPrivilege 1796 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Token: SeImpersonatePrivilege 1796 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe Token: SeDebugPrivilege 4308 powershell.exe Token: SeDebugPrivilege 3480 powershell.exe Token: SeDebugPrivilege 3084 powershell.exe Token: SeDebugPrivilege 4484 powershell.exe Token: SeDebugPrivilege 2152 powershell.exe Token: SeDebugPrivilege 4808 powershell.exe Token: SeSystemEnvironmentPrivilege 2636 csrss.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exebb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.execmd.execsrss.exedescription pid process target process PID 1796 wrote to memory of 5060 1796 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe powershell.exe PID 1796 wrote to memory of 5060 1796 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe powershell.exe PID 1796 wrote to memory of 5060 1796 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe powershell.exe PID 2676 wrote to memory of 4308 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe powershell.exe PID 2676 wrote to memory of 4308 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe powershell.exe PID 2676 wrote to memory of 4308 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe powershell.exe PID 2676 wrote to memory of 4580 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe cmd.exe PID 2676 wrote to memory of 4580 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe cmd.exe PID 4580 wrote to memory of 1404 4580 cmd.exe netsh.exe PID 4580 wrote to memory of 1404 4580 cmd.exe netsh.exe PID 2676 wrote to memory of 3480 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe powershell.exe PID 2676 wrote to memory of 3480 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe powershell.exe PID 2676 wrote to memory of 3480 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe powershell.exe PID 2676 wrote to memory of 3084 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe powershell.exe PID 2676 wrote to memory of 3084 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe powershell.exe PID 2676 wrote to memory of 3084 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe powershell.exe PID 2676 wrote to memory of 2636 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe csrss.exe PID 2676 wrote to memory of 2636 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe csrss.exe PID 2676 wrote to memory of 2636 2676 bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe csrss.exe PID 2636 wrote to memory of 4484 2636 csrss.exe powershell.exe PID 2636 wrote to memory of 4484 2636 csrss.exe powershell.exe PID 2636 wrote to memory of 4484 2636 csrss.exe powershell.exe PID 2636 wrote to memory of 2152 2636 csrss.exe powershell.exe PID 2636 wrote to memory of 2152 2636 csrss.exe powershell.exe PID 2636 wrote to memory of 2152 2636 csrss.exe powershell.exe PID 2636 wrote to memory of 4808 2636 csrss.exe powershell.exe PID 2636 wrote to memory of 4808 2636 csrss.exe powershell.exe PID 2636 wrote to memory of 4808 2636 csrss.exe powershell.exe PID 2636 wrote to memory of 3872 2636 csrss.exe injector.exe PID 2636 wrote to memory of 3872 2636 csrss.exe injector.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe"C:\Users\Admin\AppData\Local\Temp\bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe"C:\Users\Admin\AppData\Local\Temp\bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11.exe"2⤵
- Adds Run key to start application
- Checks for VirtualBox DLLs, possible anti-VM trick
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Manipulates WinMonFS driver.
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /tn ScheduledUpdate /f4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nologo -noprofile4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeC:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 6563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1796 -s 8762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1796 -ip 17961⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 2676 -ip 26761⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pcyhgknl.gkg.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exeFilesize
281KB
MD5d98e33b66343e7c96158444127a117f6
SHA1bb716c5509a2bf345c6c1152f6e3e1452d39d50d
SHA2565de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1
SHA512705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD58325483df2e5ef12df4c7091e7063c80
SHA19b52a6055fdf1a11563bf52b2cf9873d01d82c4b
SHA256c73e970611bebda1cf588b813b5c4aee19cca8a5590a708a35241311aefe55a0
SHA512837d21ae3f6bffb92ef60fb3233dddba9373ac3903de4b8e9d57842bd39f6a436130892999e4b012b0049c7fee5ae171aa1a1abcab9d6db8063ce1df41b30289
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5958a2a93dec0d46f4e9ce330c4d70934
SHA1de827c51f4ba4de9f667d05c4f32c9cdd6d1efb6
SHA2561c952cdcf58c4d2858574a2cd9962edb2167a4c8e770e5f998f8cd618c5950a7
SHA512f99c62c670e2e3bf2aebdc5b349fe1e682ee5d94fc9668f5bb98ead1acb2d7e80afe239a5562b6e634a44cab5b267aa1afff6cc46371fbf89cc32c0f6cd7955a
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5d3ee8bd8ed7d7d6b4f2621b9fb1275bc
SHA1810b4ff0cce95837be24d906595b1d9da70cdb6d
SHA2568e55ef2813392ee18673f26680b56e0752fdacd7849d0ae24cdb213ff000489c
SHA512f3060e3e2306931d2b9581c6876843ec280c8c6a965043ab8bd8c8710ad63a8375bad01bcb3fd28e32b801c6341713df3d71ac60809bd24f7a191eb205164995
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD512b9ceaa7877d24dd0e721287161368a
SHA1dc88e47705dc78de19da82909905d5aaa311074f
SHA2561d2801078759870cfdd8871c7b46cd8828de3122dbd450c49771ca107c890334
SHA512f9d1a78c7fedf7fe4b8d50341cf80e99a95bc3d5a20a490782a8709df973dfa80d89789806869e465abc8a17ff156d2c2b6b0c5dfd51d7dded6efacdb7fa478d
-
C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-InteractiveFilesize
19KB
MD5d92a669c8517594d4f8e52facd5fa1c1
SHA1316c3a160a46cad3a8722d9900657d1ba96e65ce
SHA256d25fa8d0f39e46d6d3503b0a4aa3cda4702422e1ae3dc647621eafafa1eae8fb
SHA5125b979824239950c97e7dfdcac3259bd6b4e9fbcf7064d5fbd051c93079d633c445d85d5e27b71395b48e2eda0b23352eacde1b48aab61cf2811a520836d41864
-
C:\Windows\rss\csrss.exeFilesize
4.2MB
MD542fdcd52e07ef84b87b95ce44263b604
SHA17d121559c9f918b35e4ab85b837050f902700c19
SHA256bb47d9cc0d80f8c56030262bf813a704c6d18793171018ea1747be733e7bef11
SHA5122fc0e6516ce8673a24e6176977a6d05ea3f2daf248050ebd9c81d04d700c7a9ba036d8b5913638f4eaa3013bd456db1840ed1ae6e3c6d8c572ae90f5c5e96266
-
memory/1796-1-0x00000000047B0000-0x0000000004BA9000-memory.dmpFilesize
4.0MB
-
memory/1796-51-0x0000000000400000-0x0000000004420000-memory.dmpFilesize
64.1MB
-
memory/1796-52-0x0000000006550000-0x0000000006E3B000-memory.dmpFilesize
8.9MB
-
memory/1796-3-0x0000000000400000-0x0000000004420000-memory.dmpFilesize
64.1MB
-
memory/1796-2-0x0000000006550000-0x0000000006E3B000-memory.dmpFilesize
8.9MB
-
memory/2152-177-0x00000000065F0000-0x0000000006605000-memory.dmpFilesize
84KB
-
memory/2152-166-0x0000000070DE0000-0x0000000071137000-memory.dmpFilesize
3.3MB
-
memory/2152-162-0x0000000006270000-0x00000000065C7000-memory.dmpFilesize
3.3MB
-
memory/2152-164-0x0000000006840000-0x000000000688C000-memory.dmpFilesize
304KB
-
memory/2152-165-0x0000000070B90000-0x0000000070BDC000-memory.dmpFilesize
304KB
-
memory/2152-176-0x0000000007DD0000-0x0000000007DE1000-memory.dmpFilesize
68KB
-
memory/2152-175-0x0000000007A50000-0x0000000007AF4000-memory.dmpFilesize
656KB
-
memory/2636-210-0x0000000000400000-0x0000000004420000-memory.dmpFilesize
64.1MB
-
memory/2636-214-0x0000000000400000-0x0000000004420000-memory.dmpFilesize
64.1MB
-
memory/2636-207-0x0000000000400000-0x0000000004420000-memory.dmpFilesize
64.1MB
-
memory/2636-209-0x0000000000400000-0x0000000004420000-memory.dmpFilesize
64.1MB
-
memory/2636-199-0x0000000000400000-0x0000000004420000-memory.dmpFilesize
64.1MB
-
memory/2636-153-0x0000000000400000-0x0000000004420000-memory.dmpFilesize
64.1MB
-
memory/2636-206-0x0000000000400000-0x0000000004420000-memory.dmpFilesize
64.1MB
-
memory/2636-216-0x0000000000400000-0x0000000004420000-memory.dmpFilesize
64.1MB
-
memory/2636-211-0x0000000000400000-0x0000000004420000-memory.dmpFilesize
64.1MB
-
memory/2636-208-0x0000000000400000-0x0000000004420000-memory.dmpFilesize
64.1MB
-
memory/2636-212-0x0000000000400000-0x0000000004420000-memory.dmpFilesize
64.1MB
-
memory/2636-213-0x0000000000400000-0x0000000004420000-memory.dmpFilesize
64.1MB
-
memory/2636-215-0x0000000000400000-0x0000000004420000-memory.dmpFilesize
64.1MB
-
memory/2676-120-0x0000000000400000-0x0000000004420000-memory.dmpFilesize
64.1MB
-
memory/2676-127-0x0000000000400000-0x0000000004420000-memory.dmpFilesize
64.1MB
-
memory/3084-111-0x0000000070F10000-0x0000000071267000-memory.dmpFilesize
3.3MB
-
memory/3084-108-0x00000000063F0000-0x0000000006747000-memory.dmpFilesize
3.3MB
-
memory/3084-110-0x0000000070D10000-0x0000000070D5C000-memory.dmpFilesize
304KB
-
memory/3480-84-0x0000000005D50000-0x00000000060A7000-memory.dmpFilesize
3.3MB
-
memory/3480-89-0x0000000070D10000-0x0000000070D5C000-memory.dmpFilesize
304KB
-
memory/3480-90-0x0000000070F50000-0x00000000712A7000-memory.dmpFilesize
3.3MB
-
memory/4308-61-0x0000000005BF0000-0x0000000005F47000-memory.dmpFilesize
3.3MB
-
memory/4308-75-0x00000000076E0000-0x00000000076F5000-memory.dmpFilesize
84KB
-
memory/4308-74-0x0000000007690000-0x00000000076A1000-memory.dmpFilesize
68KB
-
memory/4308-64-0x0000000070E90000-0x00000000711E7000-memory.dmpFilesize
3.3MB
-
memory/4308-63-0x0000000070D10000-0x0000000070D5C000-memory.dmpFilesize
304KB
-
memory/4308-62-0x0000000006190000-0x00000000061DC000-memory.dmpFilesize
304KB
-
memory/4308-73-0x0000000007350000-0x00000000073F4000-memory.dmpFilesize
656KB
-
memory/4484-139-0x0000000070C70000-0x0000000070CBC000-memory.dmpFilesize
304KB
-
memory/4484-136-0x0000000006040000-0x0000000006397000-memory.dmpFilesize
3.3MB
-
memory/4484-138-0x00000000066A0000-0x00000000066EC000-memory.dmpFilesize
304KB
-
memory/4484-151-0x0000000005EC0000-0x0000000005ED5000-memory.dmpFilesize
84KB
-
memory/4484-140-0x0000000070DF0000-0x0000000071147000-memory.dmpFilesize
3.3MB
-
memory/4484-149-0x0000000007750000-0x00000000077F4000-memory.dmpFilesize
656KB
-
memory/4484-150-0x0000000005E80000-0x0000000005E91000-memory.dmpFilesize
68KB
-
memory/4808-189-0x0000000070B90000-0x0000000070BDC000-memory.dmpFilesize
304KB
-
memory/4808-187-0x0000000005B80000-0x0000000005ED7000-memory.dmpFilesize
3.3MB
-
memory/4808-190-0x0000000070DA0000-0x00000000710F7000-memory.dmpFilesize
3.3MB
-
memory/5060-40-0x0000000007E60000-0x0000000007EF6000-memory.dmpFilesize
600KB
-
memory/5060-48-0x0000000074990000-0x0000000075141000-memory.dmpFilesize
7.7MB
-
memory/5060-41-0x0000000007DD0000-0x0000000007DE1000-memory.dmpFilesize
68KB
-
memory/5060-43-0x0000000007E20000-0x0000000007E35000-memory.dmpFilesize
84KB
-
memory/5060-39-0x0000000007DA0000-0x0000000007DAA000-memory.dmpFilesize
40KB
-
memory/5060-38-0x0000000007D60000-0x0000000007D7A000-memory.dmpFilesize
104KB
-
memory/5060-37-0x00000000083A0000-0x0000000008A1A000-memory.dmpFilesize
6.5MB
-
memory/5060-36-0x0000000007C30000-0x0000000007CD4000-memory.dmpFilesize
656KB
-
memory/5060-26-0x0000000070D80000-0x00000000710D7000-memory.dmpFilesize
3.3MB
-
memory/5060-35-0x0000000007C10000-0x0000000007C2E000-memory.dmpFilesize
120KB
-
memory/5060-44-0x0000000007F20000-0x0000000007F3A000-memory.dmpFilesize
104KB
-
memory/5060-25-0x0000000070C00000-0x0000000070C4C000-memory.dmpFilesize
304KB
-
memory/5060-45-0x0000000007F00000-0x0000000007F08000-memory.dmpFilesize
32KB
-
memory/5060-42-0x0000000007E10000-0x0000000007E1E000-memory.dmpFilesize
56KB
-
memory/5060-24-0x0000000007BB0000-0x0000000007BE4000-memory.dmpFilesize
208KB
-
memory/5060-23-0x0000000006D40000-0x0000000006D86000-memory.dmpFilesize
280KB
-
memory/5060-22-0x0000000006B00000-0x0000000006B4C000-memory.dmpFilesize
304KB
-
memory/5060-21-0x0000000006790000-0x00000000067AE000-memory.dmpFilesize
120KB
-
memory/5060-20-0x0000000006320000-0x0000000006677000-memory.dmpFilesize
3.3MB
-
memory/5060-11-0x00000000062B0000-0x0000000006316000-memory.dmpFilesize
408KB
-
memory/5060-10-0x00000000061D0000-0x0000000006236000-memory.dmpFilesize
408KB
-
memory/5060-9-0x00000000059F0000-0x0000000005A12000-memory.dmpFilesize
136KB
-
memory/5060-5-0x0000000074990000-0x0000000075141000-memory.dmpFilesize
7.7MB
-
memory/5060-6-0x00000000032D0000-0x00000000032E0000-memory.dmpFilesize
64KB
-
memory/5060-8-0x0000000005A70000-0x000000000609A000-memory.dmpFilesize
6.2MB
-
memory/5060-7-0x00000000032D0000-0x00000000032E0000-memory.dmpFilesize
64KB
-
memory/5060-4-0x0000000003320000-0x0000000003356000-memory.dmpFilesize
216KB