Resubmissions

06/12/2022, 16:58

221206-vhcetsfd65 8

06/12/2022, 16:53

221206-vd7eeahh5z 1

Analysis

  • max time kernel
    271s
  • max time network
    274s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06/12/2022, 16:58

General

  • Target

    https://itsupportdev.servicesnowservices.com/

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Drops file in Windows directory 5 IoCs
  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 37 IoCs
  • Suspicious use of FindShellTrayWindow 30 IoCs
  • Suspicious use of SendNotifyMessage 27 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" https://itsupportdev.servicesnowservices.com/
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xd0,0xd4,0xd8,0xac,0xdc,0x7ff9e00e4f50,0x7ff9e00e4f60,0x7ff9e00e4f70
      2⤵
        PID:2504
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1532 /prefetch:2
        2⤵
          PID:4788
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1772 /prefetch:8
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4812
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2276 /prefetch:8
          2⤵
            PID:2832
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2936 /prefetch:1
            2⤵
              PID:3096
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2944 /prefetch:1
              2⤵
                PID:3148
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4284 /prefetch:8
                2⤵
                  PID:1604
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4512 /prefetch:1
                  2⤵
                    PID:3776
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3148 /prefetch:1
                    2⤵
                      PID:5044
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3080 /prefetch:1
                      2⤵
                        PID:4736
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:1
                        2⤵
                          PID:4244
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
                          2⤵
                            PID:4236
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5024 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3992
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5320 /prefetch:8
                            2⤵
                              PID:4912
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3052 /prefetch:8
                              2⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4928
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3044 /prefetch:8
                              2⤵
                                PID:4932
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5368 /prefetch:8
                                2⤵
                                  PID:4796
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5432 /prefetch:8
                                  2⤵
                                    PID:4804
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5500 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4880
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5492 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4776
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2204 /prefetch:1
                                    2⤵
                                      PID:4604
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4464 /prefetch:1
                                      2⤵
                                        PID:1392
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2320 /prefetch:8
                                        2⤵
                                          PID:660
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4880 /prefetch:8
                                          2⤵
                                            PID:512
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:1
                                            2⤵
                                              PID:4968
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1456 /prefetch:8
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:2328
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5320 /prefetch:8
                                              2⤵
                                                PID:4988
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 /prefetch:8
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:4760
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4732 /prefetch:8
                                                2⤵
                                                  PID:2156
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5684 /prefetch:8
                                                  2⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:2388
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4028 /prefetch:8
                                                  2⤵
                                                    PID:4548
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4648 /prefetch:8
                                                    2⤵
                                                      PID:4168
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=812 /prefetch:8
                                                      2⤵
                                                        PID:4176
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4808 /prefetch:8
                                                        2⤵
                                                          PID:4196
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5704 /prefetch:8
                                                          2⤵
                                                            PID:4188
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4228 /prefetch:8
                                                            2⤵
                                                              PID:4848
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5320 /prefetch:8
                                                              2⤵
                                                                PID:4876
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4196 /prefetch:8
                                                                2⤵
                                                                  PID:4776
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:1
                                                                  2⤵
                                                                    PID:2264
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1
                                                                    2⤵
                                                                      PID:764
                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:1
                                                                      2⤵
                                                                        PID:304
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4672 /prefetch:2
                                                                        2⤵
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:1796
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5576 /prefetch:8
                                                                        2⤵
                                                                          PID:4888
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1036 /prefetch:8
                                                                          2⤵
                                                                            PID:1360
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1304,8865844030204138167,3807130396967264609,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5132 /prefetch:8
                                                                            2⤵
                                                                              PID:6108
                                                                          • C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe
                                                                            "C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe"
                                                                            1⤵
                                                                            • Drops file in Program Files directory
                                                                            PID:2092
                                                                            • C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir2092_1646834584\ChromeRecovery.exe
                                                                              "C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir2092_1646834584\ChromeRecovery.exe" --appguid={8A69D345-D564-463c-AFF1-A69D9E530F96} --browser-version=89.0.4389.114 --sessionid={7bb48c54-b824-4da9-bb0b-3aaf93256758} --system
                                                                              2⤵
                                                                              • Executes dropped EXE
                                                                              PID:708
                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe"
                                                                            1⤵
                                                                              PID:1256
                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe"
                                                                                2⤵
                                                                                • Checks processor information in registry
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                • Suspicious use of FindShellTrayWindow
                                                                                • Suspicious use of SendNotifyMessage
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:4928
                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4928.0.2045866529\1800586411" -parentBuildID 20200403170909 -prefsHandle 1512 -prefMapHandle 1504 -prefsLen 1 -prefMapSize 219938 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4928 "\\.\pipe\gecko-crash-server-pipe.4928" 1608 gpu
                                                                                  3⤵
                                                                                    PID:2156
                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4928.3.616528956\2133349933" -childID 1 -isForBrowser -prefsHandle 2236 -prefMapHandle 2232 -prefsLen 156 -prefMapSize 219938 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4928 "\\.\pipe\gecko-crash-server-pipe.4928" 2248 tab
                                                                                    3⤵
                                                                                      PID:1904
                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4928.13.1536552718\1354507190" -childID 2 -isForBrowser -prefsHandle 3432 -prefMapHandle 3428 -prefsLen 6938 -prefMapSize 219938 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 4928 "\\.\pipe\gecko-crash-server-pipe.4928" 3380 tab
                                                                                      3⤵
                                                                                        PID:4456
                                                                                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
                                                                                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
                                                                                    1⤵
                                                                                    • Drops file in Windows directory
                                                                                    • Modifies Internet Explorer settings
                                                                                    • Modifies registry class
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:3380
                                                                                  • C:\Windows\system32\browser_broker.exe
                                                                                    C:\Windows\system32\browser_broker.exe -Embedding
                                                                                    1⤵
                                                                                    • Modifies Internet Explorer settings
                                                                                    PID:1012
                                                                                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                    1⤵
                                                                                    • Suspicious behavior: MapViewOfSection
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:1080
                                                                                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                    1⤵
                                                                                    • Drops file in Windows directory
                                                                                    • Modifies Internet Explorer settings
                                                                                    • Modifies registry class
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:1948
                                                                                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                    1⤵
                                                                                    • Drops file in Windows directory
                                                                                    • Modifies Internet Explorer settings
                                                                                    • Modifies registry class
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:2028
                                                                                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                    1⤵
                                                                                    • Modifies registry class
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:4696
                                                                                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                    1⤵
                                                                                    • Modifies registry class
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:5556
                                                                                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                    1⤵
                                                                                    • Drops file in Windows directory
                                                                                    • Modifies registry class
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:5728
                                                                                  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                    1⤵
                                                                                      PID:5852
                                                                                    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
                                                                                      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
                                                                                      1⤵
                                                                                      • Modifies registry class
                                                                                      PID:5176
                                                                                    • C:\Windows\system32\AUDIODG.EXE
                                                                                      C:\Windows\system32\AUDIODG.EXE 0x420
                                                                                      1⤵
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:5928

                                                                                    Network

                                                                                    MITRE ATT&CK Enterprise v6

                                                                                    Replay Monitor

                                                                                    Loading Replay Monitor...

                                                                                    Downloads

                                                                                    • C:\Program Files\Google\Chrome\ChromeRecovery\scoped_dir2092_1646834584\ChromeRecovery.exe

                                                                                      Filesize

                                                                                      253KB

                                                                                      MD5

                                                                                      49ac3c96d270702a27b4895e4ce1f42a

                                                                                      SHA1

                                                                                      55b90405f1e1b72143c64113e8bc65608dd3fd76

                                                                                      SHA256

                                                                                      82aa3fd6a25cda9e16689cfadea175091be010cecae537e517f392e0bef5ba0f

                                                                                      SHA512

                                                                                      b62f6501cb4c992d42d9097e356805c88ac4ac5a46ead4a8eee9f8cbae197b2305da8aab5b4a61891fe73951588025f2d642c32524b360687993f98c913138a0

                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\RecoveryImproved\1.3.36.141\Recovery.crx3

                                                                                      Filesize

                                                                                      141KB

                                                                                      MD5

                                                                                      ea1c1ffd3ea54d1fb117bfdbb3569c60

                                                                                      SHA1

                                                                                      10958b0f690ae8f5240e1528b1ccffff28a33272

                                                                                      SHA256

                                                                                      7c3a6a7d16ac44c3200f572a764bce7d8fa84b9572dd028b15c59bdccbc0a77d

                                                                                      SHA512

                                                                                      6c30728cac9eac53f0b27b7dbe2222da83225c3b63617d6b271a6cfedf18e8f0a8dffa1053e1cbc4c5e16625f4bbc0d03aa306a946c9d72faa4ceb779f8ffcaf

                                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

                                                                                      Filesize

                                                                                      446B

                                                                                      MD5

                                                                                      1cb9ae53252ffc8140179fca34d79a16

                                                                                      SHA1

                                                                                      c844eab1ded8f67b2da231ecedcceaf051408349

                                                                                      SHA256

                                                                                      e546fbee2806f2ce54bf9e88c799bb83833484d98d821750f1b41239fc7f6431

                                                                                      SHA512

                                                                                      cbeab81c1c100490cc2099f0d2934eafd50fe79d99bc0f7aac7dfe9ddeb8b8bc42beaa3b86940f7f670a81b0df40efd8a57337d64dec644ab67e8a8f3576c9b4

                                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\Cookies\2F0UGYU1.cookie

                                                                                      Filesize

                                                                                      101B

                                                                                      MD5

                                                                                      f80300bd05c4ceb4e0be9bcf309e22ba

                                                                                      SHA1

                                                                                      e6922d228e4e20383b04c09fd617df49bdca3dca

                                                                                      SHA256

                                                                                      d2b054d2726994eb7dc56db7cb00c28ab9c3f144513235606ae597f2a48872cb

                                                                                      SHA512

                                                                                      d994dbed92ff43634419449a5a680217249c9724b18560b647097a44591a5a208f3d257e9d7388c1a3ca402b969b7ff96c7ecbcb2f661e84ced7473d9d7f5ace

                                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\Cookies\9TW8N0X6.cookie

                                                                                      Filesize

                                                                                      101B

                                                                                      MD5

                                                                                      98c8ab1317e60522e0444c4b54776951

                                                                                      SHA1

                                                                                      b6536ddf327c025e9cb9c0c730efd3df8323f37d

                                                                                      SHA256

                                                                                      52e532471937c4adcfae0dcfde3cb6289018bf18014af2e83389a85e51dcdcda

                                                                                      SHA512

                                                                                      1e1180408a2252fd3884f2dcc685332e128c15affa3d7d02f90ae494554680df6e0a8a885c5ffee470ce0a5b88709b4e68c8cdd9a5255d7f8429a53933e809a7

                                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\Cookies\LNSUKTOB.cookie

                                                                                      Filesize

                                                                                      580B

                                                                                      MD5

                                                                                      2503cc45f0084ade62e2c5fb3cdd0536

                                                                                      SHA1

                                                                                      2c41b095adfc5439f4b6ac10269ff7a4bc78cef1

                                                                                      SHA256

                                                                                      373e5e4cefc45488079e8a1d281bde23cf0f887bbab56c8f58f993608eab065c

                                                                                      SHA512

                                                                                      2096a69f77449b53705030d3b1f1e04d5ac041cda642b47385313c11d01dfd2857f6711d65d321d2cd803390121c67bfeb5069167af343d4c796b237bda1cdc6

                                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\Cookies\LYEQAJ5R.cookie

                                                                                      Filesize

                                                                                      614B

                                                                                      MD5

                                                                                      64702531a9698a35b2f757f8c6ecd175

                                                                                      SHA1

                                                                                      0928d0a39cb3db4147fcccf0aae668f216363d84

                                                                                      SHA256

                                                                                      336b7d7af925d0b95f852158f50daed765c8330caa847b44f2eaef64341074e5

                                                                                      SHA512

                                                                                      e9754f283338a238d6146f0314e9b7d6b3f363d5a11c9e9c7fba28b13bcef4ae601896d9e25709ba3a0c80d143c05693d9260a27325af725c1f8522da9fbd5eb

                                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\Cookies\N1DF5R13.cookie

                                                                                      Filesize

                                                                                      391B

                                                                                      MD5

                                                                                      c69af0d5f3fb27a3f43686ec2448ed4a

                                                                                      SHA1

                                                                                      8ba8a72c9c778cee9124f89d80c946c0a55fb16c

                                                                                      SHA256

                                                                                      252a4dfbe0825631b0eca03e4dbca96f4fd5680e127330989339b57246e52f52

                                                                                      SHA512

                                                                                      1035d47da8ef1399b784ee5fc7ae31ae791d70ab8c357d292698ed09f2a6fd6779b7f8a952b9dea0861924ecb6eb92ef59aca8b3d11cd49c5c8f1882e3f75559

                                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!002\MicrosoftEdge\Cookies\RSFH11ZP.cookie

                                                                                      Filesize

                                                                                      101B

                                                                                      MD5

                                                                                      88bea331122b9dc47c3175fc96834a1b

                                                                                      SHA1

                                                                                      dd28cc26d260126c910ac172506e9008f58c50a1

                                                                                      SHA256

                                                                                      b83929a6c8499f4e11544a15b2c7b4bc263d12d1d904a06c74e723a25f0e4aeb

                                                                                      SHA512

                                                                                      f9a3634ff8aa04d8dceeb0e351574a94180cde664f396d1abe5d759b29f97c6d3b38370dda0a68e159a5d771446035a95fbce21afe76fb19e1814161201d3b69

                                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!002\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                      Filesize

                                                                                      4KB

                                                                                      MD5

                                                                                      f7dcb24540769805e5bb30d193944dce

                                                                                      SHA1

                                                                                      e26c583c562293356794937d9e2e6155d15449ee

                                                                                      SHA256

                                                                                      6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

                                                                                      SHA512

                                                                                      cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94

                                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!002\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                      Filesize

                                                                                      4KB

                                                                                      MD5

                                                                                      f7dcb24540769805e5bb30d193944dce

                                                                                      SHA1

                                                                                      e26c583c562293356794937d9e2e6155d15449ee

                                                                                      SHA256

                                                                                      6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

                                                                                      SHA512

                                                                                      cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94

                                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!002\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                      Filesize

                                                                                      4KB

                                                                                      MD5

                                                                                      f7dcb24540769805e5bb30d193944dce

                                                                                      SHA1

                                                                                      e26c583c562293356794937d9e2e6155d15449ee

                                                                                      SHA256

                                                                                      6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

                                                                                      SHA512

                                                                                      cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94

                                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!002\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      0fab858373745ab41df8a2b9145ef2f2

                                                                                      SHA1

                                                                                      d0f6290586fc7ce0ce275685e8b67b89c86176d1

                                                                                      SHA256

                                                                                      e8bb09f5c2360a4f8b60b6800e941f92b4bc825fec8be8151c3bfd77ca7aab07

                                                                                      SHA512

                                                                                      3a15f8ce5ad507a58850fa6609d785a89ad906e7401152da2808d06fdb36f33bd191633b81ab84e77b9006f20ad7e19893ded3f2725c359cfa770cb68d049545

                                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!002\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                      Filesize

                                                                                      340B

                                                                                      MD5

                                                                                      226db988ad7ecde7bc267c2c7fc7a2a5

                                                                                      SHA1

                                                                                      c5d2be8f770d32e5bc89773eb5806ec4b95ab7ca

                                                                                      SHA256

                                                                                      589dcac06a1b4576990093dbbddc4441c34658b447585af81d1abb71e6388c30

                                                                                      SHA512

                                                                                      c0b3f9c3023bf48cc20cf73f8d14549559d7cbf31d048d9873bc5ad365a570b93d238d10553d87ba291d3da472b883e0a0a66e66f4b6132568133dd143cad0a7

                                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!002\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                      Filesize

                                                                                      340B

                                                                                      MD5

                                                                                      12fb7bbcf316e31538092ff65504f447

                                                                                      SHA1

                                                                                      dd0f3db71bfcb6dc3f4e1263481551fa74ab3843

                                                                                      SHA256

                                                                                      5a9256bcd3ac75908319335279fd8810132ec683e4038486de53511b536d611a

                                                                                      SHA512

                                                                                      a087772b3b063e639e4b5c265afb28f398a9b8d2fd610dbbc645e974586ec7b3ab27541607263e21239920a797609caa1d4608e566416c6f5c3f1234c254a265

                                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!002\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

                                                                                      Filesize

                                                                                      340B

                                                                                      MD5

                                                                                      12fb7bbcf316e31538092ff65504f447

                                                                                      SHA1

                                                                                      dd0f3db71bfcb6dc3f4e1263481551fa74ab3843

                                                                                      SHA256

                                                                                      5a9256bcd3ac75908319335279fd8810132ec683e4038486de53511b536d611a

                                                                                      SHA512

                                                                                      a087772b3b063e639e4b5c265afb28f398a9b8d2fd610dbbc645e974586ec7b3ab27541607263e21239920a797609caa1d4608e566416c6f5c3f1234c254a265

                                                                                    • C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!002\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442

                                                                                      Filesize

                                                                                      446B

                                                                                      MD5

                                                                                      a7f43a523ee3795932835ce3882b68d1

                                                                                      SHA1

                                                                                      aa7850c75b4f2aa6c62fb0abca02ea54d4c1973f

                                                                                      SHA256

                                                                                      4e18e08dcebe645f5ffe0dbec45055362768f7a1caf07989b9b8221bab2e3246

                                                                                      SHA512

                                                                                      4a669089cd22a3fa6bbd149b6a957bb09414a94bcbd290f672f38ce196844d99ba0fde9f79962b03c537d50fa04586e96ac367930c90052a8928d618ef35d638

                                                                                    • memory/708-159-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-170-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-139-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-140-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-141-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-142-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-143-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-144-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-145-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-146-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-147-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-148-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-149-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-150-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-151-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-152-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-153-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-154-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-155-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-156-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-157-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-158-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-137-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-160-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-161-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-162-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-163-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-164-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-165-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-166-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-167-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-168-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-169-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-138-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-172-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-174-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-173-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-177-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-178-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-176-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-175-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-171-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-179-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-180-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-181-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-182-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-183-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-185-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-184-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-186-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-136-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-135-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-134-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-133-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-132-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-131-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-130-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-129-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-128-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-127-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-126-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-187-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-188-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB

                                                                                    • memory/708-189-0x0000000077A00000-0x0000000077B8E000-memory.dmp

                                                                                      Filesize

                                                                                      1.6MB