Analysis
-
max time kernel
133s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29-06-2024 14:23
Static task
static1
Behavioral task
behavioral1
Sample
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe
Resource
win7-20240611-en
General
-
Target
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe
-
Size
21.8MB
-
MD5
1cd9fc4cf9f85f777e60a994fc705208
-
SHA1
ea129535780075708285c11221a7f4e5aad22059
-
SHA256
2fa0119c42af70f6df2723082af718a9be89e3b88a1e748b09ce61e0ece87441
-
SHA512
18a58b8761c37ba0bd5f69ea9f67c956f9a02bf3cd056c745a653d12e7865dea5aa62ef7619143fdb91cb664d9183fa0a05bb766e291e398a8193f576ce44b53
-
SSDEEP
393216:NIIgLGRXzFimEAJ+RPJ3mxyR1GHep4bogBTihxn5njHmVlECtFM3W0:OIgLwRifS+RB2xyR1G+prTxn5SVlTtF0
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 7 IoCs
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe:*:enabled:@shell32.dll,-1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Detects executables packed with Sality Polymorphic Code Generator or Simple Poly Engine or Sality 38 IoCs
Processes:
resource yara_rule behavioral2/memory/3544-1-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-2-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-7-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-9-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-8-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-10-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-12-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-14-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-13-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-11-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-20-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-21-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-22-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-23-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-24-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-28-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-29-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-30-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-32-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-33-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-35-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-37-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-40-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-43-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-45-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-44-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-48-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-50-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-52-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-54-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-56-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-58-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-59-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-60-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-75-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-76-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-78-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine behavioral2/memory/3544-80-0x00000000038C0000-0x000000000494E000-memory.dmp INDICATOR_EXE_Packed_SimplePolyEngine -
UPX dump on OEP (original entry point) 38 IoCs
Processes:
resource yara_rule behavioral2/memory/3544-1-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-2-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-7-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-9-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-8-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-10-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-12-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-14-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-13-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-11-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-20-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-21-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-22-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-23-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-24-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-28-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-29-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-30-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-32-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-33-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-35-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-37-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-40-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-43-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-45-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-44-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-48-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-50-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-52-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-54-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-56-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-58-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-59-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-60-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-75-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-76-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-78-0x00000000038C0000-0x000000000494E000-memory.dmp UPX behavioral2/memory/3544-80-0x00000000038C0000-0x000000000494E000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
Processes:
msedge.exepid process 3460 msedge.exe -
Processes:
resource yara_rule behavioral2/memory/3544-1-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-2-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-7-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-9-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-8-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-10-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-12-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-14-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-13-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-11-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-20-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-21-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-22-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-23-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-24-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-28-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-29-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-30-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-32-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-33-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-35-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-37-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-40-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-43-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-45-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-44-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-48-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-50-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-52-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-54-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-56-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-58-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-59-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-60-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-75-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-76-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-78-0x00000000038C0000-0x000000000494E000-memory.dmp upx behavioral2/memory/3544-80-0x00000000038C0000-0x000000000494E000-memory.dmp upx -
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription ioc process File opened (read-only) \??\J: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\M: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\P: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\Q: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\T: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\X: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\Y: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\E: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\L: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\U: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\W: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\Z: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\K: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\N: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\O: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\V: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\G: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\H: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\I: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\R: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened (read-only) \??\S: 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription ioc process File opened for modification C:\autorun.inf 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification F:\autorun.inf 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Drops file in Program Files directory 16 IoCs
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7ZG.EXE 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\7-ZIP\UNINSTALL.EXE 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\InspectorOfficeGadget.exe 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7ZFM.EXE 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\AppVShNotify.exe 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7Z.EXE 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\appvcleaner.exe 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Drops file in Windows directory 1 IoCs
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exepid process 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exepid process 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription pid process Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe Token: SeDebugPrivilege 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exepid process 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription pid process target process PID 3544 wrote to memory of 632 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe winlogon.exe PID 3544 wrote to memory of 632 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe winlogon.exe PID 3544 wrote to memory of 632 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe winlogon.exe PID 3544 wrote to memory of 632 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe winlogon.exe PID 3544 wrote to memory of 632 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe winlogon.exe PID 3544 wrote to memory of 632 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe winlogon.exe PID 3544 wrote to memory of 692 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe lsass.exe PID 3544 wrote to memory of 692 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe lsass.exe PID 3544 wrote to memory of 692 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe lsass.exe PID 3544 wrote to memory of 692 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe lsass.exe PID 3544 wrote to memory of 692 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe lsass.exe PID 3544 wrote to memory of 692 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe lsass.exe PID 3544 wrote to memory of 792 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 792 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 792 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 792 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 792 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 792 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 800 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe fontdrvhost.exe PID 3544 wrote to memory of 800 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe fontdrvhost.exe PID 3544 wrote to memory of 800 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe fontdrvhost.exe PID 3544 wrote to memory of 800 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe fontdrvhost.exe PID 3544 wrote to memory of 800 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe fontdrvhost.exe PID 3544 wrote to memory of 800 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe fontdrvhost.exe PID 3544 wrote to memory of 804 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe fontdrvhost.exe PID 3544 wrote to memory of 804 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe fontdrvhost.exe PID 3544 wrote to memory of 804 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe fontdrvhost.exe PID 3544 wrote to memory of 804 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe fontdrvhost.exe PID 3544 wrote to memory of 804 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe fontdrvhost.exe PID 3544 wrote to memory of 804 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe fontdrvhost.exe PID 3544 wrote to memory of 912 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 912 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 912 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 912 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 912 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 912 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 960 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 960 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 960 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 960 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 960 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 960 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 384 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe dwm.exe PID 3544 wrote to memory of 384 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe dwm.exe PID 3544 wrote to memory of 384 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe dwm.exe PID 3544 wrote to memory of 384 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe dwm.exe PID 3544 wrote to memory of 384 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe dwm.exe PID 3544 wrote to memory of 384 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe dwm.exe PID 3544 wrote to memory of 396 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 396 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 396 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 396 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 396 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 396 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 928 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 928 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 928 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 928 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 928 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 928 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 1012 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 1012 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 1012 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe PID 3544 wrote to memory of 1012 3544 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe svchost.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding2⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca2⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe2⤵
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵
-
C:\Windows\system32\sihost.exesihost.exe2⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe"C:\Users\Admin\AppData\Local\Temp\2024-06-29_1cd9fc4cf9f85f777e60a994fc705208_icedid.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.52 --initial-client-data=0x238,0x23c,0x240,0x234,0x2f0,0x7ffd7c282e98,0x7ffd7c282ea4,0x7ffd7c282eb02⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2276 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:22⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2340 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:32⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=2520 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:82⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --mojo-platform-channel-handle=5312 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=5568 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:12⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3100 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:82⤵
- Executes dropped EXE
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Impair Defenses
4Disable or Modify Tools
3Disable or Modify System Firewall
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exeFilesize
3.9MB
MD5faf79a48399d502194e87a5ad1ba7b8e
SHA109cd9d783ac126d33ec37de781beedce9ce6aa51
SHA2563d1266025af95bdb7b92d17debbf88a1386b19b7f7c2eeb9ced77debb9748e14
SHA512d84f8e25179e2cee6f95dc95c94a4a70dc56814aaf7f95e38f24f9828e64629cab0c184f5fddd67d834f419703f65d9d0e3a93e54d2730ed63d3d89644babb84
-
C:\Users\Admin\AppData\Local\Temp\pcic.exeFilesize
105KB
MD564267871810a30afad1c519594e01ee5
SHA12b60da60f3454739a8726c9a36888255c6ef8ae0
SHA25663be75b5547d9a068127519764ad49dd93160460bca3ffdb9119e285df9ab96c
SHA51210e5d4d7a7f390865f45eefde550c9c950a47bc2f763cc47a8d15829d2540a49e599b927776a3ba655941847e0461c40e39b371e21c31fd2faf6f092bb862ecb
-
memory/3544-0-0x0000000000400000-0x00000000019C3000-memory.dmpFilesize
21.8MB
-
memory/3544-1-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-2-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-3-0x000000007FE40000-0x000000007FE4C000-memory.dmpFilesize
48KB
-
memory/3544-4-0x0000000077812000-0x0000000077813000-memory.dmpFilesize
4KB
-
memory/3544-5-0x0000000077813000-0x0000000077814000-memory.dmpFilesize
4KB
-
memory/3544-7-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-9-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-8-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-10-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-12-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-14-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-13-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-11-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-15-0x000000007FE40000-0x000000007FE4C000-memory.dmpFilesize
48KB
-
memory/3544-17-0x0000000005C80000-0x0000000005C81000-memory.dmpFilesize
4KB
-
memory/3544-16-0x0000000005C30000-0x0000000005C32000-memory.dmpFilesize
8KB
-
memory/3544-18-0x0000000005C30000-0x0000000005C32000-memory.dmpFilesize
8KB
-
memory/3544-19-0x0000000005C30000-0x0000000005C32000-memory.dmpFilesize
8KB
-
memory/3544-20-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-21-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-22-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-23-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-24-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-25-0x000000007FE40000-0x000000007FE4C000-memory.dmpFilesize
48KB
-
memory/3544-26-0x000000007FE40000-0x000000007FE4C000-memory.dmpFilesize
48KB
-
memory/3544-28-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-29-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-30-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-32-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-33-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-35-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-37-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-40-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-43-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-45-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-44-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-48-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-50-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-52-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-54-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-56-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-58-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-59-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-60-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-75-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-76-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-78-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-80-0x00000000038C0000-0x000000000494E000-memory.dmpFilesize
16.6MB
-
memory/3544-82-0x0000000005C30000-0x0000000005C32000-memory.dmpFilesize
8KB