Analysis
-
max time kernel
4294185s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
09-03-2022 23:15
Behavioral task
behavioral1
Sample
PRACTICE_LESS__PLAY_MORE__-_Steve_Mastroianni.pdf
Resource
win7-20220223-en
General
-
Target
PRACTICE_LESS__PLAY_MORE__-_Steve_Mastroianni.pdf
-
Size
2.2MB
-
MD5
526e2b4ae17794043a860d3acba2ac25
-
SHA1
4aa8673b3a6ab1e84e3ceed3786c4592c0fb8e12
-
SHA256
8702574a24facaa0de973e0aeed25796740d21cca8cf45d5e2cda11a6578190c
-
SHA512
dd2069e1d5622be90cd154c5d58055437b83a3aa2a682decb0773bbb9d24a1d924915b58db3beeae93e38f750f0f823c35237d8b0803f57abbc94363e8c9e691
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\practicelessplaymore.com\Total = "493" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\practicelessplaymore.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\practicelessplaymore.com\Total = "535" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Height = "21" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\practicelessplaymore.com\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\practicelessplaymore.com\Total = "69" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Height = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "353632764" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\practicelessplaymore.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\practicelessplaymore.com\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "69" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\IntelliForms\AskUser = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\practicelessplaymore.com\ = "18" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\practicelessplaymore.com\ = "69" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "473" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F3062311-9FFE-11EC-9EF3-D22A65399F91} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "493" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\practicelessplaymore.com\Total = "18" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "535" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\practicelessplaymore.com\ = "535" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000ab8535dea0c55241b6e6a02dc814678c00000000020000000000106600000001000020000000167ade44ddce73abfeb9ab2926564d089bd5d1d59ee7e44e668f0f02f15a01e1000000000e8000000002000020000000a20d6eee5702b0249bea4985dd4fa66d7bee350aafe9968d1484d52d817854cc20000000895290417a25840c54c1d9b760382a292664e39797c3e4b5911554dc95efe34d40000000061da0ed6c74eac6e86506f6b661ae36cea53ea9b95abaaaa93e9a300acfd305125d3b1e0ebb2635e857b7f305ce94b99d2654c60574269dc4d30a402c5f5f98 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\practicelessplaymore.com\ = "493" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "18" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\practicelessplaymore.com\ = "473" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\DOMStorage\practicelessplaymore.com\Total = "473" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0d013c30b34d801 iexplore.exe -
Modifies registry class 2 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache firefox.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 2388 chrome.exe 2756 chrome.exe 2756 chrome.exe 3552 chrome.exe 3552 chrome.exe 3552 chrome.exe 4080 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 1260 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
IEXPLORE.EXEfirefox.exedescription pid process Token: 33 1600 IEXPLORE.EXE Token: SeIncBasePriorityPrivilege 1600 IEXPLORE.EXE Token: SeDebugPrivilege 2656 firefox.exe Token: SeDebugPrivilege 2656 firefox.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
Processes:
iexplore.exefirefox.exechrome.exepid process 1468 iexplore.exe 2656 firefox.exe 2656 firefox.exe 2656 firefox.exe 2656 firefox.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe -
Suspicious use of SendNotifyMessage 35 IoCs
Processes:
firefox.exechrome.exepid process 2656 firefox.exe 2656 firefox.exe 2656 firefox.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe 2756 chrome.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
AcroRd32.exeiexplore.exeIEXPLORE.EXEfirefox.exepid process 1260 AcroRd32.exe 1260 AcroRd32.exe 1260 AcroRd32.exe 1260 AcroRd32.exe 1468 iexplore.exe 1468 iexplore.exe 1600 IEXPLORE.EXE 1600 IEXPLORE.EXE 1600 IEXPLORE.EXE 1600 IEXPLORE.EXE 1600 IEXPLORE.EXE 1600 IEXPLORE.EXE 2656 firefox.exe 2656 firefox.exe 2656 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
AcroRd32.exeiexplore.exefirefox.exefirefox.exedescription pid process target process PID 1260 wrote to memory of 1468 1260 AcroRd32.exe iexplore.exe PID 1260 wrote to memory of 1468 1260 AcroRd32.exe iexplore.exe PID 1260 wrote to memory of 1468 1260 AcroRd32.exe iexplore.exe PID 1260 wrote to memory of 1468 1260 AcroRd32.exe iexplore.exe PID 1468 wrote to memory of 1600 1468 iexplore.exe IEXPLORE.EXE PID 1468 wrote to memory of 1600 1468 iexplore.exe IEXPLORE.EXE PID 1468 wrote to memory of 1600 1468 iexplore.exe IEXPLORE.EXE PID 1468 wrote to memory of 1600 1468 iexplore.exe IEXPLORE.EXE PID 2652 wrote to memory of 2656 2652 firefox.exe firefox.exe PID 2652 wrote to memory of 2656 2652 firefox.exe firefox.exe PID 2652 wrote to memory of 2656 2652 firefox.exe firefox.exe PID 2652 wrote to memory of 2656 2652 firefox.exe firefox.exe PID 2652 wrote to memory of 2656 2652 firefox.exe firefox.exe PID 2652 wrote to memory of 2656 2652 firefox.exe firefox.exe PID 2652 wrote to memory of 2656 2652 firefox.exe firefox.exe PID 2652 wrote to memory of 2656 2652 firefox.exe firefox.exe PID 2652 wrote to memory of 2656 2652 firefox.exe firefox.exe PID 2652 wrote to memory of 2656 2652 firefox.exe firefox.exe PID 2656 wrote to memory of 2896 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2896 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2896 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe PID 2656 wrote to memory of 2972 2656 firefox.exe firefox.exe
Processes
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\PRACTICE_LESS__PLAY_MORE__-_Steve_Mastroianni.pdf"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://practicelessplaymore.com/audiobook2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1468 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2656.0.2079959060\2039772162" -parentBuildID 20200403170909 -prefsHandle 1192 -prefMapHandle 1184 -prefsLen 1 -prefMapSize 219626 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2656 "\\.\pipe\gecko-crash-server-pipe.2656" 1264 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2656.3.1462343775\2009939162" -childID 1 -isForBrowser -prefsHandle 1568 -prefMapHandle 1560 -prefsLen 122 -prefMapSize 219626 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2656 "\\.\pipe\gecko-crash-server-pipe.2656" 1712 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2656.13.1177381787\617196240" -childID 2 -isForBrowser -prefsHandle 2624 -prefMapHandle 2620 -prefsLen 6979 -prefMapSize 219626 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2656 "\\.\pipe\gecko-crash-server-pipe.2656" 2636 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2656.20.1206811081\1092940366" -childID 3 -isForBrowser -prefsHandle 3376 -prefMapHandle 3356 -prefsLen 7801 -prefMapSize 219626 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2656 "\\.\pipe\gecko-crash-server-pipe.2656" 3388 tab3⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef4454f50,0x7fef4454f60,0x7fef4454f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1768 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2076 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2068 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3016 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3032 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3368 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3376 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3400 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3820 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3716 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3628 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3748 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3868 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3608 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3416 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3688 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2224 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1052,17733382058499901253,14013938735259589643,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1872 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAMD5
682dbe32d173ce154223803680a1a0c7
SHA1af826dd060f3f5f2adcafb41abf9c3df2087773f
SHA256013e1b179efa9ef058bd72632f238a76c161afe172a55fea6f572acb935dd2c5
SHA51215b068924802d69bb8b21d8fe70db73d6d66fc979739a0307888d258730674a69e6e9617bf1361e208d0688fb3e3072e1819414e606af981ea1bca6790fc3e4d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\64DCC9872C5635B1B7891B30665E0558_5552C20A2631357820903FD38A8C0F9FMD5
24d695dee96a646bfab1b471f354342f
SHA190b66021e1be3c45e2bd0a8265c2f684ff2758b8
SHA25639135203483866fda7e6d4057a1c92f93aaa8b761a960f6b606cee64a33e528f
SHA5120193b9f6264a11b29b23f1d60f0be6dd815d0c8f25fc942473be057dfdb544128ddf258dcb978496374ebdc65ee5eeec017d765dc92ff953acbeb764a7b8c742
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
42c983442421c5deface660afaf6e2b4
SHA167f0a16fcb829cb2e0cc61f701a4050934973fae
SHA2566b24607f63a3741fa371ad9d11c21e979580b9f4c80bca91b0e650f89b84970f
SHA5126e1ab9a00275591129db54f564bde61c78566d66fb2d201ef9cc57c42f74c7f706bc3fa3689ca626e1ea1e9d9ef486b2e8d83687eff7aa83199e72194408a370
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015MD5
637481df32351129e60560d5a5c100b5
SHA1a46aee6e5a4a4893fba5806bcc14fc7fb3ce80ae
SHA2561f1029d94ca4656a577d554cedd79d447658f475af08620084897a5523587052
SHA512604bfd0a78a57dfddd45872803501ad89491e37e89e0778b0f13644fa9164ff509955a57469dfdd65a05bbedaf0acb669f68430e84800d17efe7d360a70569e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_979AB563CEB98F2581C14ED89B8957D4MD5
eefc19dadf12a74b622257f2b754cf7f
SHA11248e96db4d3edbe31bb5f6d5a21fd67c9739ac5
SHA256f82d700180152194f713371436ad3657dcbb2f0b6bf3a3e230b083d4a003d014
SHA512c92a0d28a89b75817a62b5cbf465ef1aedf83b83b8179150c1d0cf67f7d4f5bf3d35d62a4ce74df7302bb0c747f7f8363d7ca3cc1dd0731c90a760f678c68335
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAMD5
64e9b8bb98e2303717538ce259bec57d
SHA12b07bf8e0d831da42760c54feff484635009c172
SHA25676bd459ec8e467efc3e3fb94cb21b9c77a2aa73c9d4c0f3faf823677be756331
SHA5128980af4a87a009f1ae165182d1edd4ccbd12b40a5890de5dbaea4dbf3aeb86edffd58b088b1e35e12d6b1197cc0db658a9392283583b3cb24a516ebc1f736c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F07644E38ED7C9F37D11EEC6D4335E02_D8EDEB0EC6D9AAA5DD7CBF7889723E55MD5
eaccc0a41f4cf94d483ee886bed056db
SHA1c16b0e94ac04415b4952e7c81e18f97ae532027d
SHA256ce275a435b0c9b0eda2622c086bdfb71d6144c85b2383c8bfdb6952d761b454c
SHA512b1c6b86e92e79f3d0e59eafab67441e5e09e489797fb3d7d3cc1224ca606908e152cfe4b00b1a10f354bbb6b5842e69ee0088e67401ec9ab6b47aa0ff18e0482
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAMD5
aa63c6969f29b55044f97f3e4d69a6e4
SHA162c23b791ecafee30c65c3a8e81f2186c369c750
SHA2563817397a02c49c91ace9312da4597125cf7a5c32b5863278731768477222811d
SHA512baf520eb8e5b36339f704ef9bdbc02c2643486a53f8551c21ed40b8cca4e3fed958daa59a3e4b168593cd8385b3fcd07737ba2c84edeca9cde9e9b0bc1ddc11e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\64DCC9872C5635B1B7891B30665E0558_5552C20A2631357820903FD38A8C0F9FMD5
a6cb8a39be27e203085a17c55428c80b
SHA1f2d100ae8d8a49122c6cd704c1cf53eac5d38405
SHA256b8bff4374461052796b1eaf8462b7e91184502930aafb26dfcaa530bf55ff715
SHA512c55c49262a3e1bcf7b5cedc0ad0a6c25f7f58ecfa2a776b2c1479acbb494b4dd61c84595402ec7759ae9b13d51f7f6ae91d48c23aaa845ce7b464a020e151e9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27MD5
d0c5e615971e6009e5ccd8269b9e4504
SHA19dc563f4077a348b67ab3680596ad849b5de35bb
SHA25634cbb5d0f46b1a6ef340abde3f63b4928a8948dea7209e165df40a9c3a8cd683
SHA512712ccd9d8e3f904d7614e93c01912a571d1cbd7513cffb300f43ab33d01589bd5d0258435428e8565d0b63a1b0da9931e82b4770948a754292a87f13cbfa17d6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
2a0dbf65e8b86c53c795109840bd4b85
SHA1aff5e17f47d01b36494e045121313d3b4f5958da
SHA2568b241434e58611b7aa7ffcaa86774bb476402653bd6ebc8105e04b36ce396853
SHA512f8d19a5b90debe2ebcf39c4e3b829238df821c8618e0bc8a1e44bac32b06f70861debcd12e95bfb540178c75582c2ab9d5a444224e8d70cf5bf7860c3e5b3098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_979AB563CEB98F2581C14ED89B8957D4MD5
2b4330e115bfcc0d7648e4e6a4d0ccc9
SHA1bdf69d6d0284c6001b4e3e82fbbf2732073932bf
SHA2565c31dd392809f80e8889dc8a765b2a5dff8b952deb3103fe951e9d5088b0f7c2
SHA512359220337f7c5463ca0edf4d2ee65dce53227aabff686b5c727bf6edc4f8a79250538a6cc6e2d0217ce6cb66d48017ff72d9a881185ef77c166a4cfbdee1515b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBAMD5
5ca929a59b191721a2d3a988202cb3de
SHA17eae4889d46bfce475d277e2e5bb87afbab65f3b
SHA2564df34014cbdfbb92ccb5617bb3966bc21eaf8f5c95a3b56b616117def0e930e1
SHA512b63ad108325a16e587132e4c26bc61e12a972d43a74e036eb3f342bc69d722da47704c783bb6fa58c5e3fd61f98ec2632a5d0a6dec74774fd3f8b132784867d2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F07644E38ED7C9F37D11EEC6D4335E02_D8EDEB0EC6D9AAA5DD7CBF7889723E55MD5
e02d38204e68c01b7e3ac038dc0e7265
SHA1d4287f1deeb6e37bd6fe895ff1d753efe1d97f41
SHA256233d07e42cf0b77063044eb3d3c04a19940c8ab2e853f0a5c87ceb35bc4219ad
SHA512f3ab3de2c8886dba807d8305936542b55c958a18902d3a1b4bf1e56262dc48fa744ff65ba0ecf4fa1d41869293b190203e1de7ce42014fb7c236db0fb5f5cce5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\S7EUDCDQ.txtMD5
44ae58a94b3bb7c9237c12b01d1dd589
SHA11e29e8e8e276f7fe57993f68e5bd76dce196a063
SHA2561d72a1a22a63bb89e451545e2966596d1200ceb124fc0ae317d8adc5eae4b782
SHA51236dd8ff000d5df9741041bd040a3af8328c4baddcc247c427f9cae8a6b30d37e73776239ebfa707ae14da896450974f110c7e4f9ebbcd4b8bba5c352f2178f67
-
\??\pipe\crashpad_2756_JDKDWPPGBJAZKRSXMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1260-54-0x0000000075781000-0x0000000075783000-memory.dmpFilesize
8KB