Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
19-10-2023 19:09
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.137386ddefaeb0a54c91e3dc71b054a0_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.137386ddefaeb0a54c91e3dc71b054a0_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.137386ddefaeb0a54c91e3dc71b054a0_JC.exe
-
Size
558KB
-
MD5
137386ddefaeb0a54c91e3dc71b054a0
-
SHA1
0bb0cc12b7c85bd01379f8ac67dfbd1860c3ab1c
-
SHA256
daaaff6ff59a8152bfa8ba856907e6aa8225dd6408f42b3c177d77b7dc9271f3
-
SHA512
538678622662b910ec2bb7c17a045ff912c2b7e94b0c452ccf6419abd84f7c0bdb655c86a3429c22430aa47f9b1768edfc83f0ed27fbf69878a5c663a0d01a80
-
SSDEEP
12288:avYTtliLJiaw4D+jrZTc4L9DJCxe5QCB1XeOZofH4aaqlrCEFaIhn8R9:1TtkLJi5q+J40FQgFe2U2EIIK
Malware Config
Extracted
44caliber
https://discord.com/api/webhooks/1143278634606547015/JQSs3HkUCW0D0s-LEpqMmqIl4B2aemeRkd50LUDniNcTASKx3TqohfDEIC4WEy7g8rs-
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
NEAS.137386ddefaeb0a54c91e3dc71b054a0_JC.exeTinkoff.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation NEAS.137386ddefaeb0a54c91e3dc71b054a0_JC.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation Tinkoff.exe -
Drops startup file 3 IoCs
Processes:
NVDisplay.Container.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NVDisplay.Container.exe NVDisplay.Container.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NVDisplay.Container.url NVDisplay.Container.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NVDisplay.Container.exe NVDisplay.Container.exe -
Executes dropped EXE 4 IoCs
Processes:
pawno.exeTinkoff.exesystem32.exeNVDisplay.Container.exepid process 636 pawno.exe 1844 Tinkoff.exe 5064 system32.exe 5068 NVDisplay.Container.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\pawno.exe upx C:\Users\Admin\AppData\Local\Temp\pawno.exe upx behavioral2/memory/636-13-0x0000000000400000-0x00000000004D3000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\pawno.exe upx behavioral2/memory/636-169-0x0000000000400000-0x00000000004D3000-memory.dmp upx behavioral2/memory/636-190-0x0000000000400000-0x00000000004D3000-memory.dmp upx -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
NVDisplay.Container.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NVDisplay.Container.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\NVDisplay.Container.exe\" .." NVDisplay.Container.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NVDisplay.Container.exe = "\"C:\\Users\\Admin\\AppData\\Roaming\\NVDisplay.Container.exe\" .." NVDisplay.Container.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 ip-api.com 15 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
system32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 system32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier system32.exe -
Creates scheduled task(s) 1 TTPs 26 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2396 schtasks.exe 3892 schtasks.exe 640 schtasks.exe 3640 schtasks.exe 1436 schtasks.exe 4576 schtasks.exe 4856 schtasks.exe 4356 schtasks.exe 1344 schtasks.exe 4148 schtasks.exe 4900 schtasks.exe 2052 schtasks.exe 3724 schtasks.exe 1784 schtasks.exe 4500 schtasks.exe 5112 schtasks.exe 4192 schtasks.exe 4132 schtasks.exe 3652 schtasks.exe 5040 schtasks.exe 1160 schtasks.exe 2700 schtasks.exe 3120 schtasks.exe 4524 schtasks.exe 4904 schtasks.exe 4616 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4404 timeout.exe -
Kills process with taskkill 30 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exeTASKKILL.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exeTASKKILL.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exeTASKKILL.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exeTASKKILL.exetaskkill.exepid process 2992 taskkill.exe 4020 taskkill.exe 1896 taskkill.exe 3532 taskkill.exe 1936 taskkill.exe 548 taskkill.exe 3460 taskkill.exe 1556 taskkill.exe 1956 taskkill.exe 3292 TASKKILL.exe 3708 taskkill.exe 2104 taskkill.exe 1844 taskkill.exe 3364 taskkill.exe 4784 TASKKILL.exe 4128 taskkill.exe 5080 taskkill.exe 3844 taskkill.exe 2988 taskkill.exe 4340 TASKKILL.exe 848 taskkill.exe 3272 taskkill.exe 4340 taskkill.exe 4024 taskkill.exe 4916 taskkill.exe 4644 taskkill.exe 4272 taskkill.exe 3152 taskkill.exe 4868 TASKKILL.exe 4972 taskkill.exe -
Modifies registry class 10 IoCs
Processes:
pawno.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PAWN.Script\shell\Open\command pawno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PAWN.Script\DefaultIcon pawno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PAWN.Script\shell\ = "Open" pawno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PAWN.Script\shell pawno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PAWN.Script\shell\Open pawno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PAWN.Script\shell\Open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pawno.exe \"%1\"" pawno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.pwn pawno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.pwn\ = "PAWN.Script" pawno.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PAWN.Script pawno.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PAWN.Script\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\pawno.exe,1" pawno.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
system32.exeTinkoff.exepid process 5064 system32.exe 5064 system32.exe 5064 system32.exe 5064 system32.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe 1844 Tinkoff.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
Processes:
NEAS.137386ddefaeb0a54c91e3dc71b054a0_JC.exesystem32.exeTinkoff.exeTASKKILL.exeTASKKILL.exeNVDisplay.Container.exeTASKKILL.exeTASKKILL.exedescription pid process Token: SeDebugPrivilege 4448 NEAS.137386ddefaeb0a54c91e3dc71b054a0_JC.exe Token: SeDebugPrivilege 5064 system32.exe Token: SeDebugPrivilege 1844 Tinkoff.exe Token: SeDebugPrivilege 3292 TASKKILL.exe Token: SeDebugPrivilege 4868 TASKKILL.exe Token: SeDebugPrivilege 5068 NVDisplay.Container.exe Token: SeDebugPrivilege 4340 TASKKILL.exe Token: SeDebugPrivilege 4784 TASKKILL.exe Token: 33 5068 NVDisplay.Container.exe Token: SeIncBasePriorityPrivilege 5068 NVDisplay.Container.exe Token: 33 5068 NVDisplay.Container.exe Token: SeIncBasePriorityPrivilege 5068 NVDisplay.Container.exe Token: 33 5068 NVDisplay.Container.exe Token: SeIncBasePriorityPrivilege 5068 NVDisplay.Container.exe Token: 33 5068 NVDisplay.Container.exe Token: SeIncBasePriorityPrivilege 5068 NVDisplay.Container.exe Token: 33 5068 NVDisplay.Container.exe Token: SeIncBasePriorityPrivilege 5068 NVDisplay.Container.exe Token: 33 5068 NVDisplay.Container.exe Token: SeIncBasePriorityPrivilege 5068 NVDisplay.Container.exe Token: 33 5068 NVDisplay.Container.exe Token: SeIncBasePriorityPrivilege 5068 NVDisplay.Container.exe Token: 33 5068 NVDisplay.Container.exe Token: SeIncBasePriorityPrivilege 5068 NVDisplay.Container.exe Token: 33 5068 NVDisplay.Container.exe Token: SeIncBasePriorityPrivilege 5068 NVDisplay.Container.exe Token: 33 5068 NVDisplay.Container.exe Token: SeIncBasePriorityPrivilege 5068 NVDisplay.Container.exe Token: 33 5068 NVDisplay.Container.exe Token: SeIncBasePriorityPrivilege 5068 NVDisplay.Container.exe Token: 33 5068 NVDisplay.Container.exe Token: SeIncBasePriorityPrivilege 5068 NVDisplay.Container.exe Token: 33 5068 NVDisplay.Container.exe Token: SeIncBasePriorityPrivilege 5068 NVDisplay.Container.exe Token: 33 5068 NVDisplay.Container.exe Token: SeIncBasePriorityPrivilege 5068 NVDisplay.Container.exe Token: 33 5068 NVDisplay.Container.exe Token: SeIncBasePriorityPrivilege 5068 NVDisplay.Container.exe Token: 33 5068 NVDisplay.Container.exe Token: SeIncBasePriorityPrivilege 5068 NVDisplay.Container.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
NEAS.137386ddefaeb0a54c91e3dc71b054a0_JC.exeTinkoff.exeNVDisplay.Container.execmd.execmd.exedescription pid process target process PID 4448 wrote to memory of 636 4448 NEAS.137386ddefaeb0a54c91e3dc71b054a0_JC.exe pawno.exe PID 4448 wrote to memory of 636 4448 NEAS.137386ddefaeb0a54c91e3dc71b054a0_JC.exe pawno.exe PID 4448 wrote to memory of 636 4448 NEAS.137386ddefaeb0a54c91e3dc71b054a0_JC.exe pawno.exe PID 4448 wrote to memory of 1844 4448 NEAS.137386ddefaeb0a54c91e3dc71b054a0_JC.exe Tinkoff.exe PID 4448 wrote to memory of 1844 4448 NEAS.137386ddefaeb0a54c91e3dc71b054a0_JC.exe Tinkoff.exe PID 4448 wrote to memory of 1844 4448 NEAS.137386ddefaeb0a54c91e3dc71b054a0_JC.exe Tinkoff.exe PID 4448 wrote to memory of 5064 4448 NEAS.137386ddefaeb0a54c91e3dc71b054a0_JC.exe system32.exe PID 4448 wrote to memory of 5064 4448 NEAS.137386ddefaeb0a54c91e3dc71b054a0_JC.exe system32.exe PID 1844 wrote to memory of 3292 1844 Tinkoff.exe TASKKILL.exe PID 1844 wrote to memory of 3292 1844 Tinkoff.exe TASKKILL.exe PID 1844 wrote to memory of 3292 1844 Tinkoff.exe TASKKILL.exe PID 1844 wrote to memory of 4868 1844 Tinkoff.exe TASKKILL.exe PID 1844 wrote to memory of 4868 1844 Tinkoff.exe TASKKILL.exe PID 1844 wrote to memory of 4868 1844 Tinkoff.exe TASKKILL.exe PID 1844 wrote to memory of 5068 1844 Tinkoff.exe NVDisplay.Container.exe PID 1844 wrote to memory of 5068 1844 Tinkoff.exe NVDisplay.Container.exe PID 1844 wrote to memory of 5068 1844 Tinkoff.exe NVDisplay.Container.exe PID 1844 wrote to memory of 1784 1844 Tinkoff.exe cmd.exe PID 1844 wrote to memory of 1784 1844 Tinkoff.exe cmd.exe PID 1844 wrote to memory of 1784 1844 Tinkoff.exe cmd.exe PID 5068 wrote to memory of 4340 5068 NVDisplay.Container.exe TASKKILL.exe PID 5068 wrote to memory of 4340 5068 NVDisplay.Container.exe TASKKILL.exe PID 5068 wrote to memory of 4340 5068 NVDisplay.Container.exe TASKKILL.exe PID 5068 wrote to memory of 4784 5068 NVDisplay.Container.exe TASKKILL.exe PID 5068 wrote to memory of 4784 5068 NVDisplay.Container.exe TASKKILL.exe PID 5068 wrote to memory of 4784 5068 NVDisplay.Container.exe TASKKILL.exe PID 1784 wrote to memory of 1912 1784 cmd.exe choice.exe PID 1784 wrote to memory of 1912 1784 cmd.exe choice.exe PID 1784 wrote to memory of 1912 1784 cmd.exe choice.exe PID 4448 wrote to memory of 1852 4448 NEAS.137386ddefaeb0a54c91e3dc71b054a0_JC.exe cmd.exe PID 4448 wrote to memory of 1852 4448 NEAS.137386ddefaeb0a54c91e3dc71b054a0_JC.exe cmd.exe PID 1852 wrote to memory of 4404 1852 cmd.exe timeout.exe PID 1852 wrote to memory of 4404 1852 cmd.exe timeout.exe PID 5068 wrote to memory of 3708 5068 NVDisplay.Container.exe taskkill.exe PID 5068 wrote to memory of 3708 5068 NVDisplay.Container.exe taskkill.exe PID 5068 wrote to memory of 3708 5068 NVDisplay.Container.exe taskkill.exe PID 5068 wrote to memory of 3652 5068 NVDisplay.Container.exe schtasks.exe PID 5068 wrote to memory of 3652 5068 NVDisplay.Container.exe schtasks.exe PID 5068 wrote to memory of 3652 5068 NVDisplay.Container.exe schtasks.exe PID 5068 wrote to memory of 4356 5068 NVDisplay.Container.exe schtasks.exe PID 5068 wrote to memory of 4356 5068 NVDisplay.Container.exe schtasks.exe PID 5068 wrote to memory of 4356 5068 NVDisplay.Container.exe schtasks.exe PID 5068 wrote to memory of 4972 5068 NVDisplay.Container.exe taskkill.exe PID 5068 wrote to memory of 4972 5068 NVDisplay.Container.exe taskkill.exe PID 5068 wrote to memory of 4972 5068 NVDisplay.Container.exe taskkill.exe PID 5068 wrote to memory of 3164 5068 NVDisplay.Container.exe schtasks.exe PID 5068 wrote to memory of 3164 5068 NVDisplay.Container.exe schtasks.exe PID 5068 wrote to memory of 3164 5068 NVDisplay.Container.exe schtasks.exe PID 5068 wrote to memory of 4904 5068 NVDisplay.Container.exe schtasks.exe PID 5068 wrote to memory of 4904 5068 NVDisplay.Container.exe schtasks.exe PID 5068 wrote to memory of 4904 5068 NVDisplay.Container.exe schtasks.exe PID 5068 wrote to memory of 848 5068 NVDisplay.Container.exe taskkill.exe PID 5068 wrote to memory of 848 5068 NVDisplay.Container.exe taskkill.exe PID 5068 wrote to memory of 848 5068 NVDisplay.Container.exe taskkill.exe PID 5068 wrote to memory of 1472 5068 NVDisplay.Container.exe schtasks.exe PID 5068 wrote to memory of 1472 5068 NVDisplay.Container.exe schtasks.exe PID 5068 wrote to memory of 1472 5068 NVDisplay.Container.exe schtasks.exe PID 5068 wrote to memory of 4500 5068 NVDisplay.Container.exe schtasks.exe PID 5068 wrote to memory of 4500 5068 NVDisplay.Container.exe schtasks.exe PID 5068 wrote to memory of 4500 5068 NVDisplay.Container.exe schtasks.exe PID 5068 wrote to memory of 4024 5068 NVDisplay.Container.exe taskkill.exe PID 5068 wrote to memory of 4024 5068 NVDisplay.Container.exe taskkill.exe PID 5068 wrote to memory of 4024 5068 NVDisplay.Container.exe taskkill.exe PID 5068 wrote to memory of 3836 5068 NVDisplay.Container.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.137386ddefaeb0a54c91e3dc71b054a0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.137386ddefaeb0a54c91e3dc71b054a0_JC.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\pawno.exe"C:\Users\Admin\AppData\Local\Temp\pawno.exe"2⤵
- Executes dropped EXE
- Modifies registry class
-
C:\Users\Admin\AppData\Local\Temp\system32.exe"C:\Users\Admin\AppData\Local\Temp\system32.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Tinkoff.exe"C:\Users\Admin\AppData\Local\Temp\Tinkoff.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe"C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM wscript.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\TASKKILL.exeTASKKILL /F /IM cmd.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f im regedit.exe4⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn "MicrosoftEdgeUpdateTaskMachine" /f4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "MicrosoftEdgeUpdateTaskMachine" /tr C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 5 & Del "C:\Users\Admin\AppData\Local\Temp\Tinkoff.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 54⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpC64D.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\44\Процессы.txtFilesize
1KB
MD5e5a3c7dd324ae6311b1e0307e465dca0
SHA1dac02163c4deb3f5c85cb4dd758bf2e4d4168084
SHA256280660453b8991258b2625ec5087936c45a043f831c6a195da877d51147b1dfa
SHA51217f7efc3b8ec9f7599b074adb6bd31aae22b190c7b44c91cb19fbbfa4ed9ad0e398db7cb6f41f195a65c07679a9ab777a6e336800626527ce9fde4f1add68500
-
C:\Users\Admin\AppData\Local\Temp\Tinkoff.exeFilesize
315KB
MD5b0c8131c947f3fc6e211353713d41b45
SHA1c01f124661f5eb43ef11280edf60c6de05239eab
SHA256f509548a0056294ae31b828b5216edbf2d2b306a9fbe2befc653646a5fa696dd
SHA51250efdd632ea9833ae89a5a5de4d22b9f61b809e2614490895458df68a7955eb5919f9600ef8ffc50621a133ab7e88922c529920073513024b4d48757f5584d3e
-
C:\Users\Admin\AppData\Local\Temp\Tinkoff.exeFilesize
315KB
MD5b0c8131c947f3fc6e211353713d41b45
SHA1c01f124661f5eb43ef11280edf60c6de05239eab
SHA256f509548a0056294ae31b828b5216edbf2d2b306a9fbe2befc653646a5fa696dd
SHA51250efdd632ea9833ae89a5a5de4d22b9f61b809e2614490895458df68a7955eb5919f9600ef8ffc50621a133ab7e88922c529920073513024b4d48757f5584d3e
-
C:\Users\Admin\AppData\Local\Temp\Tinkoff.exeFilesize
315KB
MD5b0c8131c947f3fc6e211353713d41b45
SHA1c01f124661f5eb43ef11280edf60c6de05239eab
SHA256f509548a0056294ae31b828b5216edbf2d2b306a9fbe2befc653646a5fa696dd
SHA51250efdd632ea9833ae89a5a5de4d22b9f61b809e2614490895458df68a7955eb5919f9600ef8ffc50621a133ab7e88922c529920073513024b4d48757f5584d3e
-
C:\Users\Admin\AppData\Local\Temp\pawno.exeFilesize
297KB
MD5325558d389c149c420a2753e0d163d09
SHA13d1ac2fafe3ce5f5348a77c891074551a51e8fda
SHA256796a94ddcdb41b32d32bee020ca85371cf6bbeb968036448d0e3b0b559d7e90b
SHA512182358763d3565c4d29b51479eafeeee060b876a3884d7636caa47152d0edee1b531db955664f14e5b03e1820d960a2a532444b33702acb1a6b23b1bc450ce8e
-
C:\Users\Admin\AppData\Local\Temp\pawno.exeFilesize
297KB
MD5325558d389c149c420a2753e0d163d09
SHA13d1ac2fafe3ce5f5348a77c891074551a51e8fda
SHA256796a94ddcdb41b32d32bee020ca85371cf6bbeb968036448d0e3b0b559d7e90b
SHA512182358763d3565c4d29b51479eafeeee060b876a3884d7636caa47152d0edee1b531db955664f14e5b03e1820d960a2a532444b33702acb1a6b23b1bc450ce8e
-
C:\Users\Admin\AppData\Local\Temp\pawno.exeFilesize
297KB
MD5325558d389c149c420a2753e0d163d09
SHA13d1ac2fafe3ce5f5348a77c891074551a51e8fda
SHA256796a94ddcdb41b32d32bee020ca85371cf6bbeb968036448d0e3b0b559d7e90b
SHA512182358763d3565c4d29b51479eafeeee060b876a3884d7636caa47152d0edee1b531db955664f14e5b03e1820d960a2a532444b33702acb1a6b23b1bc450ce8e
-
C:\Users\Admin\AppData\Local\Temp\system32.exeFilesize
274KB
MD5fee50b354a8993b7283f12b81ef8f855
SHA184c44e24e907a4365a506b04d8687582403338c9
SHA256e3868f4ce019171488de75d019051f9d033a83ef198d77b194169b1592eb3013
SHA51297922a9f44029fa7ffcf992d7d6fe681a267247f92878715e7804a9514c6df2eec404f2ab1cfdaaa4ffefa7b1a4734ac4d27d4e8791743d64ff4f71862fd08a1
-
C:\Users\Admin\AppData\Local\Temp\system32.exeFilesize
274KB
MD5fee50b354a8993b7283f12b81ef8f855
SHA184c44e24e907a4365a506b04d8687582403338c9
SHA256e3868f4ce019171488de75d019051f9d033a83ef198d77b194169b1592eb3013
SHA51297922a9f44029fa7ffcf992d7d6fe681a267247f92878715e7804a9514c6df2eec404f2ab1cfdaaa4ffefa7b1a4734ac4d27d4e8791743d64ff4f71862fd08a1
-
C:\Users\Admin\AppData\Local\Temp\system32.exeFilesize
274KB
MD5fee50b354a8993b7283f12b81ef8f855
SHA184c44e24e907a4365a506b04d8687582403338c9
SHA256e3868f4ce019171488de75d019051f9d033a83ef198d77b194169b1592eb3013
SHA51297922a9f44029fa7ffcf992d7d6fe681a267247f92878715e7804a9514c6df2eec404f2ab1cfdaaa4ffefa7b1a4734ac4d27d4e8791743d64ff4f71862fd08a1
-
C:\Users\Admin\AppData\Local\Temp\tmpC64D.tmp.batFilesize
192B
MD53ec45aced2300ae1385088dbdc084870
SHA1769a790903235fc3940489a6f75491922229b6d1
SHA25617285df9e745284f1e570af7bcfb0426c27ac15a62ed6436cc252ff8d35a282f
SHA512167b348ec80357704c509e6e45471bc46a42f085ab2c1d8d348bc76eb1aa64b4c70e9714bbc9d5f4843009cfdea411e42908106e7a3665831c08ecbb1571e696
-
C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exeFilesize
315KB
MD5b0c8131c947f3fc6e211353713d41b45
SHA1c01f124661f5eb43ef11280edf60c6de05239eab
SHA256f509548a0056294ae31b828b5216edbf2d2b306a9fbe2befc653646a5fa696dd
SHA51250efdd632ea9833ae89a5a5de4d22b9f61b809e2614490895458df68a7955eb5919f9600ef8ffc50621a133ab7e88922c529920073513024b4d48757f5584d3e
-
C:\Users\Admin\AppData\Roaming\NVDisplay.Container.exeFilesize
315KB
MD5b0c8131c947f3fc6e211353713d41b45
SHA1c01f124661f5eb43ef11280edf60c6de05239eab
SHA256f509548a0056294ae31b828b5216edbf2d2b306a9fbe2befc653646a5fa696dd
SHA51250efdd632ea9833ae89a5a5de4d22b9f61b809e2614490895458df68a7955eb5919f9600ef8ffc50621a133ab7e88922c529920073513024b4d48757f5584d3e
-
memory/636-190-0x0000000000400000-0x00000000004D3000-memory.dmpFilesize
844KB
-
memory/636-13-0x0000000000400000-0x00000000004D3000-memory.dmpFilesize
844KB
-
memory/636-57-0x00000000005C0000-0x00000000005C1000-memory.dmpFilesize
4KB
-
memory/636-174-0x00000000005C0000-0x00000000005C1000-memory.dmpFilesize
4KB
-
memory/636-169-0x0000000000400000-0x00000000004D3000-memory.dmpFilesize
844KB
-
memory/1844-156-0x0000000004EC0000-0x0000000004ED0000-memory.dmpFilesize
64KB
-
memory/1844-67-0x0000000004C50000-0x0000000004CEC000-memory.dmpFilesize
624KB
-
memory/1844-155-0x0000000005480000-0x0000000005A24000-memory.dmpFilesize
5.6MB
-
memory/1844-178-0x0000000074DE0000-0x0000000075590000-memory.dmpFilesize
7.7MB
-
memory/1844-65-0x0000000074DE0000-0x0000000075590000-memory.dmpFilesize
7.7MB
-
memory/1844-64-0x0000000000390000-0x00000000003E6000-memory.dmpFilesize
344KB
-
memory/1844-176-0x0000000074DE0000-0x0000000075590000-memory.dmpFilesize
7.7MB
-
memory/4448-0-0x00000000002F0000-0x0000000000382000-memory.dmpFilesize
584KB
-
memory/4448-184-0x00007FFCB7B70000-0x00007FFCB8631000-memory.dmpFilesize
10.8MB
-
memory/4448-162-0x00007FFCB7B70000-0x00007FFCB8631000-memory.dmpFilesize
10.8MB
-
memory/4448-163-0x000000001B390000-0x000000001B3A0000-memory.dmpFilesize
64KB
-
memory/4448-2-0x000000001B390000-0x000000001B3A0000-memory.dmpFilesize
64KB
-
memory/4448-1-0x00007FFCB7B70000-0x00007FFCB8631000-memory.dmpFilesize
10.8MB
-
memory/5064-31-0x0000025B36D50000-0x0000025B36D9A000-memory.dmpFilesize
296KB
-
memory/5064-47-0x00007FFCB7B70000-0x00007FFCB8631000-memory.dmpFilesize
10.8MB
-
memory/5064-66-0x0000025B51430000-0x0000025B51440000-memory.dmpFilesize
64KB
-
memory/5064-161-0x00007FFCB7B70000-0x00007FFCB8631000-memory.dmpFilesize
10.8MB
-
memory/5068-179-0x0000000005260000-0x0000000005270000-memory.dmpFilesize
64KB
-
memory/5068-188-0x0000000006090000-0x0000000006122000-memory.dmpFilesize
584KB
-
memory/5068-189-0x0000000006050000-0x000000000605A000-memory.dmpFilesize
40KB
-
memory/5068-177-0x0000000074DE0000-0x0000000075590000-memory.dmpFilesize
7.7MB
-
memory/5068-191-0x0000000074DE0000-0x0000000075590000-memory.dmpFilesize
7.7MB
-
memory/5068-192-0x0000000005260000-0x0000000005270000-memory.dmpFilesize
64KB
-
memory/5068-193-0x0000000006DB0000-0x0000000006E16000-memory.dmpFilesize
408KB
-
memory/5068-194-0x0000000008970000-0x0000000008988000-memory.dmpFilesize
96KB
-
memory/5068-197-0x0000000005260000-0x0000000005270000-memory.dmpFilesize
64KB
-
memory/5068-199-0x0000000005260000-0x0000000005270000-memory.dmpFilesize
64KB