Analysis
-
max time kernel
125s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10-06-2024 17:31
Static task
static1
Behavioral task
behavioral1
Sample
ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe
Resource
win10v2004-20240508-en
General
-
Target
ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe
-
Size
2.9MB
-
MD5
d6b524f167d66e47732a8d571d77ad8a
-
SHA1
3153337307f5afb83666f87a281e8554dd704504
-
SHA256
ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba
-
SHA512
29d65092a7aaa7a02937802676f59a4e6ef78621a923b09b2b97a74961c3903a8f218b2441911bcdf54f49ab706743495192595522d950c74747d0ca2d20d0c9
-
SSDEEP
49152:PfKMhB+xFZaotJqrLFdbsf0HLBUl/D7XKqb4SIN4dEXhEqe6U7mBU5SbtIQrWeyH:nKiUrNtmLbbsf0HdUDLc2dAimBU5SOQY
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe -
Processes:
ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe -
Processes:
ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 29 IoCs
Processes:
resource yara_rule behavioral1/memory/3008-4-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-12-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-6-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-11-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-14-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-10-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-7-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-15-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-13-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-9-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-62-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-59-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-68-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-70-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-69-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-72-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-73-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-74-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-77-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-85-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-86-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-89-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-90-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-94-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-98-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-100-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-101-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-109-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral1/memory/3008-110-0x00000000026F0000-0x00000000037AA000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 31 IoCs
Processes:
resource yara_rule behavioral1/memory/3008-4-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-12-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-6-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-11-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-14-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-10-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-36-0x0000000001000000-0x00000000012E9000-memory.dmp UPX behavioral1/memory/3008-7-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-15-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-13-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-9-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-62-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-59-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-68-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-70-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-69-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-72-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-73-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-74-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-77-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-85-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-86-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-89-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-90-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-94-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-98-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-100-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-101-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-109-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-110-0x00000000026F0000-0x00000000037AA000-memory.dmp UPX behavioral1/memory/3008-121-0x0000000001000000-0x00000000012E9000-memory.dmp UPX -
Executes dropped EXE 2 IoCs
Processes:
install.exeExplorer.EXEpid process 2168 install.exe 1128 Explorer.EXE -
Loads dropped DLL 3 IoCs
Processes:
ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exeinstall.exepid process 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe 2168 install.exe -
Processes:
resource yara_rule behavioral1/memory/3008-4-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-12-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-6-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-11-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-14-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-10-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-7-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-15-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-13-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-9-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-62-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-59-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-68-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-70-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-69-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-72-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-73-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-74-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-77-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-85-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-86-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-89-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-90-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-94-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-98-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-100-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-101-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-109-0x00000000026F0000-0x00000000037AA000-memory.dmp upx behavioral1/memory/3008-110-0x00000000026F0000-0x00000000037AA000-memory.dmp upx -
Processes:
ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe -
Processes:
ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exedescription ioc process File opened (read-only) \??\I: ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened (read-only) \??\K: ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened (read-only) \??\L: ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened (read-only) \??\P: ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened (read-only) \??\Q: ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened (read-only) \??\V: ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened (read-only) \??\E: ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened (read-only) \??\O: ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened (read-only) \??\U: ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened (read-only) \??\G: ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened (read-only) \??\J: ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened (read-only) \??\N: ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened (read-only) \??\R: ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened (read-only) \??\T: ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened (read-only) \??\Z: ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened (read-only) \??\H: ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened (read-only) \??\M: ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened (read-only) \??\S: ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened (read-only) \??\W: ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened (read-only) \??\X: ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened (read-only) \??\Y: ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exedescription ioc process File opened for modification F:\autorun.inf ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened for modification C:\autorun.inf ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe -
Drops file in Program Files directory 5 IoCs
Processes:
ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened for modification C:\Program Files\7-Zip\7z.exe ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened for modification C:\Program Files\7-Zip\7zG.exe ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe -
Drops file in Windows directory 2 IoCs
Processes:
ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exedescription ioc process File created C:\Windows\f762156 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe File opened for modification C:\Windows\SYSTEM.INI ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exepid process 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
Processes:
ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exedescription pid process Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Token: SeDebugPrivilege 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exedescription pid process target process PID 3008 wrote to memory of 1056 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Dwm.exe PID 3008 wrote to memory of 1080 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe taskhost.exe PID 3008 wrote to memory of 1128 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Explorer.EXE PID 3008 wrote to memory of 1560 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe DllHost.exe PID 3008 wrote to memory of 2168 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe install.exe PID 3008 wrote to memory of 2168 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe install.exe PID 3008 wrote to memory of 2168 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe install.exe PID 3008 wrote to memory of 2168 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe install.exe PID 3008 wrote to memory of 1056 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Dwm.exe PID 3008 wrote to memory of 1080 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe taskhost.exe PID 3008 wrote to memory of 1128 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Explorer.EXE PID 3008 wrote to memory of 2168 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe install.exe PID 3008 wrote to memory of 1056 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Dwm.exe PID 3008 wrote to memory of 1080 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe taskhost.exe PID 3008 wrote to memory of 1128 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Explorer.EXE PID 3008 wrote to memory of 2168 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe install.exe PID 3008 wrote to memory of 1056 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Dwm.exe PID 3008 wrote to memory of 1080 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe taskhost.exe PID 3008 wrote to memory of 1128 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Explorer.EXE PID 3008 wrote to memory of 2168 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe install.exe PID 3008 wrote to memory of 1056 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Dwm.exe PID 3008 wrote to memory of 1080 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe taskhost.exe PID 3008 wrote to memory of 1128 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Explorer.EXE PID 3008 wrote to memory of 2168 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe install.exe PID 3008 wrote to memory of 1056 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Dwm.exe PID 3008 wrote to memory of 1080 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe taskhost.exe PID 3008 wrote to memory of 1128 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Explorer.EXE PID 3008 wrote to memory of 2168 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe install.exe PID 3008 wrote to memory of 1056 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Dwm.exe PID 3008 wrote to memory of 1080 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe taskhost.exe PID 3008 wrote to memory of 1128 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Explorer.EXE PID 3008 wrote to memory of 2168 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe install.exe PID 3008 wrote to memory of 1056 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Dwm.exe PID 3008 wrote to memory of 1080 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe taskhost.exe PID 3008 wrote to memory of 1128 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Explorer.EXE PID 3008 wrote to memory of 2168 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe install.exe PID 3008 wrote to memory of 1056 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Dwm.exe PID 3008 wrote to memory of 1080 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe taskhost.exe PID 3008 wrote to memory of 1128 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Explorer.EXE PID 3008 wrote to memory of 2168 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe install.exe PID 3008 wrote to memory of 1056 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Dwm.exe PID 3008 wrote to memory of 1080 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe taskhost.exe PID 3008 wrote to memory of 1128 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Explorer.EXE PID 3008 wrote to memory of 2168 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe install.exe PID 3008 wrote to memory of 1056 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Dwm.exe PID 3008 wrote to memory of 1080 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe taskhost.exe PID 3008 wrote to memory of 1128 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Explorer.EXE PID 3008 wrote to memory of 2168 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe install.exe PID 3008 wrote to memory of 1056 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Dwm.exe PID 3008 wrote to memory of 1080 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe taskhost.exe PID 3008 wrote to memory of 1128 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Explorer.EXE PID 3008 wrote to memory of 2168 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe install.exe PID 3008 wrote to memory of 1056 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Dwm.exe PID 3008 wrote to memory of 1080 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe taskhost.exe PID 3008 wrote to memory of 1128 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe Explorer.EXE PID 3008 wrote to memory of 2168 3008 ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe install.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe"C:\Users\Admin\AppData\Local\Temp\ce97e89e90a639a4439f65e3b74a9d4575f69e2e8ba6bafa90ad9fc140b691ba.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\install.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\install.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
6Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\eula.2052.txtFilesize
2KB
MD5889b5770b18b138ed824f6e5130afc78
SHA1f41ad585685adee887228cdc4812034b0d7ff1a8
SHA2561e0e9d960f211a9bd4be68be9e965c4c7086158cd4830a53c042f7a376c07d73
SHA5128844dd711e57f21e16971985edf3bd36fb2888e1cecd45290b4a14c828ad400438f123bef4e75151f257b7bdc8aa6ba3ecac83d217e2fd02560e43842e12e326
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\install.iniFilesize
4KB
MD5c4c1c3275dd35aefc554683896b3e86c
SHA1ee2aa5b6bd58ccb24a3636d79aab46f72591d6ec
SHA256495caf8b60f4a26c35365c0918c6600e7b0920a997f9fb49dc975f1e1f6eb214
SHA5123fc56e5698bb3bed21c0795b3d93c7ae20443a827eb5fa1a7efca6ce3e2db692f900d48b55f50405f6209b8b3789a37ed30575159e62bf9de31edd8e975df8de
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\langpack.msiFilesize
2.0MB
MD5ac2a3cd4ead750ebcadee7162dfc3a7b
SHA12e06259f5ae2a63ccb8e12cb1cde5375e6c34d45
SHA25654bcfea3aba8cbb802954587c1b8cbd889e28e47b3d88bd0feb3c6aab05f2009
SHA51217835afdc53b896580f07e915f6290896f4df81ebdee2f1b78657a214480026404bdf8840b6a41bb139122610b9cb6d43fc7d4c5eadc1075e9c8ddb1f6f75b01
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\netfx.bmpFilesize
5KB
MD506fba95313f26e300917c6cea4480890
SHA131beee44776f114078fc403e405eaa5936c4bc3b
SHA256594884a8006e24ad5b1578cd7c75aca21171bb079ebdc4f6518905bcf2237ba1
SHA5127dca0f1ab5d3fd1ac8755142a7ca4d085bb0c2f12a7272e56159dadfa22da79ec8261815be71b9f5e7c32f6e8121ecb2443060f7db76feaf01eb193200e67dfd
-
F:\yrjljg.pifFilesize
97KB
MD531349e3a8cfbc10e0cf7a6f4d25a9cd3
SHA131e260e2a5ba1b441e9af487e0f36e573c0331bc
SHA2568874282ff00afe20ae07133839e02b224b3d28aec2c140778947ef19ca6272ea
SHA512094465d7d6fcb4eabdcfcdbd21b048945ec2473cd58be55daf742a0cc6f678fd158ac664eb65f7eac8b4fa370501797faf3aac5eeaadcdd1be62d5c06be1ad5a
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\install.exeFilesize
1.3MB
MD5222ef953c190bb1b98147198c92d867a
SHA1d6dc8a9e78510624a06d4b037a50f2e692326e9b
SHA256d551f58f5902d0b9aec9d2359f630f8cbe113c8bad394f05d0d14f762c44d0ea
SHA51270ed013feae48e384c34efca5e3e51353dcea3ced55b5004814b3049007fe742ad91d44c1c509e6a80dcf3f3c55f758624deb0f1c8fa4a05c844d15b0784017c
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\install.res.2052.dllFilesize
84KB
MD59b03e36630676745b16c8691babd9194
SHA126afb6daaa690460b5944805bf887014bfca8f9b
SHA256478eb9dca5783dc8e9daf9961e70badba14b4c59f676aa71fd9a1c3b33199b0b
SHA5122fcf94f432205e1536263cf58d6c6b346d3694457121f693703eafa39d9c226faf5a71a8ed646c6582f82a5028e877a30752cce78944127404acef39e178cb4d
-
memory/1056-22-0x0000000000130000-0x0000000000132000-memory.dmpFilesize
8KB
-
memory/2168-132-0x00000000003A0000-0x00000000003A1000-memory.dmpFilesize
4KB
-
memory/2168-63-0x00000000003A0000-0x00000000003A1000-memory.dmpFilesize
4KB
-
memory/3008-35-0x0000000000490000-0x0000000000492000-memory.dmpFilesize
8KB
-
memory/3008-3-0x00000000007B0000-0x0000000000A99000-memory.dmpFilesize
2.9MB
-
memory/3008-0-0x0000000001000000-0x00000000012E9000-memory.dmpFilesize
2.9MB
-
memory/3008-34-0x0000000000780000-0x0000000000781000-memory.dmpFilesize
4KB
-
memory/3008-32-0x0000000000780000-0x0000000000781000-memory.dmpFilesize
4KB
-
memory/3008-31-0x0000000000490000-0x0000000000492000-memory.dmpFilesize
8KB
-
memory/3008-10-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-7-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-15-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-13-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-9-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-16-0x0000000001001000-0x0000000001002000-memory.dmpFilesize
4KB
-
memory/3008-14-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-11-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-62-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-6-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-59-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-12-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-4-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-36-0x0000000001000000-0x00000000012E9000-memory.dmpFilesize
2.9MB
-
memory/3008-68-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-70-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-69-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-72-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-73-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-74-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-77-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-85-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-86-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-89-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-90-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-94-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-98-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-100-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-101-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-109-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-110-0x00000000026F0000-0x00000000037AA000-memory.dmpFilesize
16.7MB
-
memory/3008-121-0x0000000001000000-0x00000000012E9000-memory.dmpFilesize
2.9MB
-
memory/3008-2-0x00000000007B0000-0x0000000000A99000-memory.dmpFilesize
2.9MB
-
memory/3008-1-0x00000000007B0000-0x0000000000A99000-memory.dmpFilesize
2.9MB