Analysis
-
max time kernel
123s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 00:28
Static task
static1
Behavioral task
behavioral1
Sample
3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe
Resource
win7-20240508-en
General
-
Target
3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe
-
Size
1.7MB
-
MD5
2d57da77a6b8752b86501e56e2c84a1c
-
SHA1
8936031660bf2e20c99ce2e2f0d26976cea4c9bc
-
SHA256
3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6
-
SHA512
81d9e4eac849764266ccded80c43132ed2079f72daecff764ee3202122ffa003b8727822c041cc593123bac7dd9ccd7de313828be623d55af30c529589d73040
-
SSDEEP
24576:ZpYtRa6dr8+vy6mKTcq8mHVgsctvq57VNYCuO2:ZpvGDvcKTWFq57VN/uO
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe -
Processes:
3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe -
Processes:
3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe -
Processes:
resource yara_rule behavioral2/memory/5044-1-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-8-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-11-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-24-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-28-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-29-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-26-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-23-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-9-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-10-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-4-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-31-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-30-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-32-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-33-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-34-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-36-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-37-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-39-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-40-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-41-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-43-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-45-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-47-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-50-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-52-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-53-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-54-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-56-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-58-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-60-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-63-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-64-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-67-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-74-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-75-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-78-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-79-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-81-0x0000000002580000-0x000000000363A000-memory.dmp upx behavioral2/memory/5044-86-0x0000000002580000-0x000000000363A000-memory.dmp upx -
Processes:
3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe -
Processes:
3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exedescription ioc process File opened (read-only) \??\W: 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened (read-only) \??\Y: 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened (read-only) \??\I: 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened (read-only) \??\J: 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened (read-only) \??\K: 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened (read-only) \??\L: 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened (read-only) \??\N: 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened (read-only) \??\Q: 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened (read-only) \??\T: 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened (read-only) \??\U: 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened (read-only) \??\E: 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened (read-only) \??\X: 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened (read-only) \??\V: 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened (read-only) \??\H: 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened (read-only) \??\O: 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened (read-only) \??\S: 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened (read-only) \??\Z: 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened (read-only) \??\G: 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened (read-only) \??\P: 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened (read-only) \??\R: 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened (read-only) \??\M: 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exedescription ioc process File opened for modification F:\autorun.inf 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened for modification C:\autorun.inf 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe -
Drops file in Program Files directory 12 IoCs
Processes:
3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exedescription ioc process File opened for modification C:\Program Files\7-Zip\7zG.exe 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened for modification C:\Program Files\7-Zip\7z.exe 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe -
Drops file in Windows directory 2 IoCs
Processes:
3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe File created C:\Windows\e574a47 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exepid process 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exedescription pid process Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Token: SeDebugPrivilege 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exedescription pid process target process PID 5044 wrote to memory of 776 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe fontdrvhost.exe PID 5044 wrote to memory of 784 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe fontdrvhost.exe PID 5044 wrote to memory of 316 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe dwm.exe PID 5044 wrote to memory of 2928 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe sihost.exe PID 5044 wrote to memory of 2972 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe svchost.exe PID 5044 wrote to memory of 2744 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe taskhostw.exe PID 5044 wrote to memory of 3372 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Explorer.EXE PID 5044 wrote to memory of 3524 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe svchost.exe PID 5044 wrote to memory of 3744 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe DllHost.exe PID 5044 wrote to memory of 3840 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe StartMenuExperienceHost.exe PID 5044 wrote to memory of 3900 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe RuntimeBroker.exe PID 5044 wrote to memory of 3988 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe SearchApp.exe PID 5044 wrote to memory of 4092 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe RuntimeBroker.exe PID 5044 wrote to memory of 3028 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe TextInputHost.exe PID 5044 wrote to memory of 2732 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe RuntimeBroker.exe PID 5044 wrote to memory of 3860 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe RuntimeBroker.exe PID 5044 wrote to memory of 2148 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe backgroundTaskHost.exe PID 5044 wrote to memory of 4540 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe backgroundTaskHost.exe PID 5044 wrote to memory of 776 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe fontdrvhost.exe PID 5044 wrote to memory of 784 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe fontdrvhost.exe PID 5044 wrote to memory of 316 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe dwm.exe PID 5044 wrote to memory of 2928 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe sihost.exe PID 5044 wrote to memory of 2972 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe svchost.exe PID 5044 wrote to memory of 2744 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe taskhostw.exe PID 5044 wrote to memory of 3372 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Explorer.EXE PID 5044 wrote to memory of 3524 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe svchost.exe PID 5044 wrote to memory of 3744 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe DllHost.exe PID 5044 wrote to memory of 3840 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe StartMenuExperienceHost.exe PID 5044 wrote to memory of 3900 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe RuntimeBroker.exe PID 5044 wrote to memory of 3988 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe SearchApp.exe PID 5044 wrote to memory of 4092 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe RuntimeBroker.exe PID 5044 wrote to memory of 3028 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe TextInputHost.exe PID 5044 wrote to memory of 2732 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe RuntimeBroker.exe PID 5044 wrote to memory of 3860 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe RuntimeBroker.exe PID 5044 wrote to memory of 2148 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe backgroundTaskHost.exe PID 5044 wrote to memory of 4540 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe backgroundTaskHost.exe PID 5044 wrote to memory of 2380 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe RuntimeBroker.exe PID 5044 wrote to memory of 776 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe fontdrvhost.exe PID 5044 wrote to memory of 784 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe fontdrvhost.exe PID 5044 wrote to memory of 316 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe dwm.exe PID 5044 wrote to memory of 2928 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe sihost.exe PID 5044 wrote to memory of 2972 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe svchost.exe PID 5044 wrote to memory of 2744 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe taskhostw.exe PID 5044 wrote to memory of 3372 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Explorer.EXE PID 5044 wrote to memory of 3524 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe svchost.exe PID 5044 wrote to memory of 3744 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe DllHost.exe PID 5044 wrote to memory of 3840 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe StartMenuExperienceHost.exe PID 5044 wrote to memory of 3900 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe RuntimeBroker.exe PID 5044 wrote to memory of 3988 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe SearchApp.exe PID 5044 wrote to memory of 4092 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe RuntimeBroker.exe PID 5044 wrote to memory of 3028 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe TextInputHost.exe PID 5044 wrote to memory of 2732 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe RuntimeBroker.exe PID 5044 wrote to memory of 3860 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe RuntimeBroker.exe PID 5044 wrote to memory of 2148 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe backgroundTaskHost.exe PID 5044 wrote to memory of 2380 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe RuntimeBroker.exe PID 5044 wrote to memory of 776 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe fontdrvhost.exe PID 5044 wrote to memory of 784 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe fontdrvhost.exe PID 5044 wrote to memory of 316 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe dwm.exe PID 5044 wrote to memory of 2928 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe sihost.exe PID 5044 wrote to memory of 2972 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe svchost.exe PID 5044 wrote to memory of 2744 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe taskhostw.exe PID 5044 wrote to memory of 3372 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe Explorer.EXE PID 5044 wrote to memory of 3524 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe svchost.exe PID 5044 wrote to memory of 3744 5044 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe DllHost.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe"C:\Users\Admin\AppData\Local\Temp\3ceeb198d978a14e828ec4fe8717c326ab24007e922604d10e5baaa2eeb44bd6.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\iklo.pifFilesize
97KB
MD5d612d3e7da7ccda641ac8ff105ed56e8
SHA1b3a8c445b62f2c74f83c2938408bd3cebe42529e
SHA256434bb23d704577e5bd3b404252782f0d6526f945793c06515806638008b81a9f
SHA51225efdc86e0ccbf1ba16c07b0fee7047f1c54c0355bd43fd87c2d4a2bf1a930088740b22ee9583ecd6b1338aaf170f5143f3a70c3c5e2e4798c8aa483041be63a
-
memory/5044-37-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-86-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-25-0x00000000007E0000-0x00000000007E2000-memory.dmpFilesize
8KB
-
memory/5044-11-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-24-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-27-0x00000000007E0000-0x00000000007E2000-memory.dmpFilesize
8KB
-
memory/5044-28-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-29-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-26-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-23-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-9-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-13-0x0000000000CB0000-0x0000000000CB1000-memory.dmpFilesize
4KB
-
memory/5044-12-0x00000000007E0000-0x00000000007E2000-memory.dmpFilesize
8KB
-
memory/5044-10-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-4-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-31-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-39-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-32-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-33-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-34-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-36-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-0-0x0000000000400000-0x00000000005C5000-memory.dmpFilesize
1.8MB
-
memory/5044-41-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-8-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-30-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-43-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-45-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-47-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-50-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-52-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-53-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-54-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-56-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-58-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-60-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-63-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-64-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-67-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-74-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-75-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-78-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-79-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-81-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-83-0x00000000007E0000-0x00000000007E2000-memory.dmpFilesize
8KB
-
memory/5044-40-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB
-
memory/5044-1-0x0000000002580000-0x000000000363A000-memory.dmpFilesize
16.7MB