Analysis
-
max time kernel
50s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 17:01
Static task
static1
Behavioral task
behavioral1
Sample
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe
Resource
win7-20240508-en
General
-
Target
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe
-
Size
708KB
-
MD5
a7073a3267e29df0e36f16760942c4da
-
SHA1
9fb42b03685673a6936643673036a0832b90d039
-
SHA256
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632
-
SHA512
b7323bc3de45540cec738cf94b87bd6cb942e889126ca9f680731f1899ef95ab90cbd0fa240b562cbb9c9c4d275f29173e85accbfc183a39045e0c70ff358419
-
SSDEEP
12288:lJFZqYMOaQ0q9nV/zsnK23KHVI6nodVdyMLiqyVcxwtVxgpMiuzOTIfwj7LD5fe:zFZqhOBnVyK23C6OoYMLiVcKtVx4Miu9
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
IEXPLORE.EXE599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" IEXPLORE.EXE Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" IEXPLORE.EXE Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" IEXPLORE.EXE -
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" IEXPLORE.EXE -
Processes:
IEXPLORE.EXE599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" IEXPLORE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" IEXPLORE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" IEXPLORE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" IEXPLORE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" IEXPLORE.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" IEXPLORE.EXE -
Deletes itself 1 IoCs
Processes:
IEXPLORE.EXEpid process 2980 IEXPLORE.EXE -
Processes:
resource yara_rule behavioral1/memory/1728-8-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-3-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-5-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-10-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-9-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-7-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-4-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-11-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-6-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-13-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-12-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-35-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-36-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-37-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-47-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-48-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-49-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-51-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-53-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-55-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-56-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-77-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-79-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-83-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx behavioral1/memory/1728-139-0x0000000001F10000-0x0000000002F9E000-memory.dmp upx -
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe -
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe -
Enumerates connected drives 3 TTPs 57 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exeIEXPLORE.EXEdescription ioc process File opened (read-only) \??\R: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\W: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\N: IEXPLORE.EXE File opened (read-only) \??\r: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\s: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\P: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\m: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\Y: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\M: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\V: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\g: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\u: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\v: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\o: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\p: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\U: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\X: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\E: IEXPLORE.EXE File opened (read-only) \??\L: IEXPLORE.EXE File opened (read-only) \??\e: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\L: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\N: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\O: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\y: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\K: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\H: IEXPLORE.EXE File opened (read-only) \??\J: IEXPLORE.EXE File opened (read-only) \??\j: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\P: IEXPLORE.EXE File opened (read-only) \??\I: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\z: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\R: IEXPLORE.EXE File opened (read-only) \??\n: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\k: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\q: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\b: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\i: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\l: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\Q: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\I: IEXPLORE.EXE File opened (read-only) \??\S: IEXPLORE.EXE File opened (read-only) \??\a: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\w: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\T: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\t: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\x: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\H: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\S: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\G: IEXPLORE.EXE File opened (read-only) \??\h: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\Q: IEXPLORE.EXE File opened (read-only) \??\O: IEXPLORE.EXE File opened (read-only) \??\G: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\J: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe File opened (read-only) \??\K: IEXPLORE.EXE File opened (read-only) \??\M: IEXPLORE.EXE File opened (read-only) \??\E: 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exedescription ioc process File opened for modification \??\PhysicalDrive0 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe -
Drops file in Windows directory 1 IoCs
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3F94D361-2CCB-11EF-A9A6-4658C477BD5D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000587104b0d2f7da409208cf3ae9e77a2300000000020000000000106600000001000020000000d38b08ba00b33849bacbe6b9252e824e7f430627e13c9b565728e37dba19b69e000000000e800000000200002000000060737877868a5400ca1da745ead1b97cb358274601a289fdecae8c0d1e9a116c2000000039df8b72ec3c5ebd9320c661010ad644fe53b78601912685b5ec1b08cc5eb00240000000a3643fbc78c8b34b953dcf35de7575fc6d267c626e098f2b9dc9de07277a9e4a99cdb4e1aa86254d4d976f89e9c23bc665b0d384b7a28344e7bb9df14caafab1 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0e5d114d8c0da01 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exeIEXPLORE.EXEpid process 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exeIEXPLORE.EXEdescription pid process Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Token: SeDebugPrivilege 2980 IEXPLORE.EXE Token: SeDebugPrivilege 2980 IEXPLORE.EXE Token: SeDebugPrivilege 2980 IEXPLORE.EXE Token: SeDebugPrivilege 2980 IEXPLORE.EXE Token: SeDebugPrivilege 2980 IEXPLORE.EXE Token: SeDebugPrivilege 2980 IEXPLORE.EXE Token: SeDebugPrivilege 2980 IEXPLORE.EXE Token: SeDebugPrivilege 2980 IEXPLORE.EXE Token: SeDebugPrivilege 2980 IEXPLORE.EXE Token: SeDebugPrivilege 2980 IEXPLORE.EXE Token: SeDebugPrivilege 2980 IEXPLORE.EXE Token: SeDebugPrivilege 2980 IEXPLORE.EXE Token: SeDebugPrivilege 2980 IEXPLORE.EXE Token: SeDebugPrivilege 2980 IEXPLORE.EXE Token: SeDebugPrivilege 2980 IEXPLORE.EXE Token: SeDebugPrivilege 2980 IEXPLORE.EXE Token: SeDebugPrivilege 2980 IEXPLORE.EXE Token: SeDebugPrivilege 2980 IEXPLORE.EXE Token: SeDebugPrivilege 2980 IEXPLORE.EXE Token: SeDebugPrivilege 2980 IEXPLORE.EXE Token: SeDebugPrivilege 2980 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exeiexplore.exepid process 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 2524 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exepid process 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exeiexplore.exeIEXPLORE.EXEpid process 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe 2524 iexplore.exe 2524 iexplore.exe 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE 2980 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exeexplorer.exeiexplore.exeIEXPLORE.EXEdescription pid process target process PID 1728 wrote to memory of 1116 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe taskhost.exe PID 1728 wrote to memory of 1172 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Dwm.exe PID 1728 wrote to memory of 1208 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Explorer.EXE PID 1728 wrote to memory of 1756 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe DllHost.exe PID 1728 wrote to memory of 2840 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe explorer.exe PID 1728 wrote to memory of 2840 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe explorer.exe PID 1728 wrote to memory of 2840 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe explorer.exe PID 1728 wrote to memory of 2840 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe explorer.exe PID 2624 wrote to memory of 2524 2624 explorer.exe iexplore.exe PID 2624 wrote to memory of 2524 2624 explorer.exe iexplore.exe PID 2624 wrote to memory of 2524 2624 explorer.exe iexplore.exe PID 2524 wrote to memory of 2980 2524 iexplore.exe IEXPLORE.EXE PID 2524 wrote to memory of 2980 2524 iexplore.exe IEXPLORE.EXE PID 2524 wrote to memory of 2980 2524 iexplore.exe IEXPLORE.EXE PID 2524 wrote to memory of 2980 2524 iexplore.exe IEXPLORE.EXE PID 1728 wrote to memory of 1116 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe taskhost.exe PID 1728 wrote to memory of 1172 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Dwm.exe PID 1728 wrote to memory of 1208 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Explorer.EXE PID 1728 wrote to memory of 1756 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe DllHost.exe PID 1728 wrote to memory of 2624 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe explorer.exe PID 1728 wrote to memory of 2524 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe iexplore.exe PID 1728 wrote to memory of 2980 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe IEXPLORE.EXE PID 1728 wrote to memory of 2980 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe IEXPLORE.EXE PID 1728 wrote to memory of 1116 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe taskhost.exe PID 1728 wrote to memory of 1172 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Dwm.exe PID 1728 wrote to memory of 1208 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe Explorer.EXE PID 1728 wrote to memory of 1756 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe DllHost.exe PID 1728 wrote to memory of 2624 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe explorer.exe PID 1728 wrote to memory of 2524 1728 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe iexplore.exe PID 2980 wrote to memory of 1116 2980 IEXPLORE.EXE taskhost.exe PID 2980 wrote to memory of 1172 2980 IEXPLORE.EXE Dwm.exe PID 2980 wrote to memory of 1208 2980 IEXPLORE.EXE Explorer.EXE PID 2980 wrote to memory of 1756 2980 IEXPLORE.EXE DllHost.exe PID 2980 wrote to memory of 2624 2980 IEXPLORE.EXE explorer.exe PID 2980 wrote to memory of 2524 2980 IEXPLORE.EXE iexplore.exe PID 2980 wrote to memory of 1116 2980 IEXPLORE.EXE taskhost.exe PID 2980 wrote to memory of 1172 2980 IEXPLORE.EXE Dwm.exe PID 2980 wrote to memory of 1208 2980 IEXPLORE.EXE Explorer.EXE PID 2980 wrote to memory of 1756 2980 IEXPLORE.EXE DllHost.exe PID 2980 wrote to memory of 2624 2980 IEXPLORE.EXE explorer.exe PID 2980 wrote to memory of 2524 2980 IEXPLORE.EXE iexplore.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe"C:\Users\Admin\AppData\Local\Temp\599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe "http://localhost:80"3⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://localhost/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2524 CREDAT:275457 /prefetch:23⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Deletes itself
- Enumerates connected drives
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
6Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0F7622CC_Rar\599ba59f51a3bb9db2dc7a572df715182d049fefa829e6ff6debdd38d20b7632.exeFilesize
635KB
MD54b7fdcc9f207e2fcd1227b0f58f2631f
SHA1f4fef2e3d310494a3c3962a49c7c5a9ea072b2ea
SHA25612407535426bc2951f8f462cc0ffba79763de8a5fc1ee42a532b804263771e00
SHA5125a9f9f8d7e685fb10ba3f464cffd3178218a51749fde054071aa03fb04915ae3257538abbe8608ad134fb0319d3a43f19281253839053d85990b9518cd916bf1
-
C:\Users\Admin\AppData\Local\Temp\ridhg.exeFilesize
741B
MD525aa9bb549ecc7bb6100f8d179452508
SHA1a3bea5e2138d1558109fa26d46e2f79c3a20228f
SHA256df83a0d6940600e4c4954f4874fcd4dd73e781e6690c3bf56f51c95285484a3c
SHA51212e26fa999faf2ca017a49987be5c668930495c26c789e19863097e5b0555add90ecdbb397521436acb47d7f2dfd5029b9b4beed16877ac7df854b3321642e37
-
C:\Windows\SYSTEM.INIFilesize
257B
MD5fae003797d2120545e9ec3d0e768eb75
SHA1d4c0f6af4f163c9cc935da61425779f0ec7a653b
SHA256a7e01b09e916a5bf2cc27afe5a57e4124cd2b74d0449bdd4f8c534fc20991851
SHA51235c4e33376d7e7e4790b8ff39c3dc9941bfd4435aafe09573e2962eadd3a22aa008783c885df9971dd644c34763369a2227165461edefaf3120ba59555da63e4
-
C:\umlmww.pifFilesize
96KB
MD5fb3cd54ce9e6843b6e87a19d08d10172
SHA107870d02a68608f305d006d0c2bf72beee7d753c
SHA25688f8cadc3cdf943c2f9bb624303183f01c72649bd0ba9de830297916130e4447
SHA512285366583127937ad65cc0ee2dcb9845f7206b396dc337fbea9b7c146b2b622ec3f881a1946072c4e0798ea064679f5dcab5cb41e5be17b6bad653b4d324d44a
-
memory/1116-14-0x0000000002070000-0x0000000002072000-memory.dmpFilesize
8KB
-
memory/1728-35-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-48-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-4-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-11-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-6-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-13-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-26-0x00000000002D0000-0x00000000002D2000-memory.dmpFilesize
8KB
-
memory/1728-25-0x00000000002E0000-0x00000000002E1000-memory.dmpFilesize
4KB
-
memory/1728-23-0x00000000002E0000-0x00000000002E1000-memory.dmpFilesize
4KB
-
memory/1728-22-0x00000000002D0000-0x00000000002D2000-memory.dmpFilesize
8KB
-
memory/1728-9-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-12-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-29-0x0000000075920000-0x0000000075921000-memory.dmpFilesize
4KB
-
memory/1728-30-0x0000000075910000-0x0000000075A00000-memory.dmpFilesize
960KB
-
memory/1728-31-0x0000000075910000-0x0000000075A00000-memory.dmpFilesize
960KB
-
memory/1728-32-0x0000000075910000-0x0000000075A00000-memory.dmpFilesize
960KB
-
memory/1728-34-0x0000000075910000-0x0000000075A00000-memory.dmpFilesize
960KB
-
memory/1728-0-0x0000000000400000-0x00000000005A9000-memory.dmpFilesize
1.7MB
-
memory/1728-36-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-37-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-47-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-7-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-49-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-51-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-53-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-55-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-56-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-57-0x0000000000400000-0x00000000005A9000-memory.dmpFilesize
1.7MB
-
memory/1728-76-0x0000000004D40000-0x0000000004D42000-memory.dmpFilesize
8KB
-
memory/1728-73-0x0000000006360000-0x0000000006361000-memory.dmpFilesize
4KB
-
memory/1728-77-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-79-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-80-0x0000000075910000-0x0000000075A00000-memory.dmpFilesize
960KB
-
memory/1728-83-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-90-0x00000000002D0000-0x00000000002D2000-memory.dmpFilesize
8KB
-
memory/1728-112-0x0000000075910000-0x0000000075A00000-memory.dmpFilesize
960KB
-
memory/1728-139-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-140-0x0000000075910000-0x0000000075A00000-memory.dmpFilesize
960KB
-
memory/1728-10-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-5-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-3-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB
-
memory/1728-8-0x0000000001F10000-0x0000000002F9E000-memory.dmpFilesize
16.6MB