Analysis
-
max time kernel
51s -
max time network
383s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 18:33
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
darkcomet
Guest16
5.39.43.50:1609
5.39.43.50:1610
DC_MUTEX-30K25G4
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
nncDo66eHqY6
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
trojan.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" trojan.exe -
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
msdcsc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe -
Disables RegEdit via registry modification 1 IoCs
Processes:
msdcsc.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" msdcsc.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
trojan.exemsdcsc.exepid process 1712 trojan.exe 1784 msdcsc.exe -
Loads dropped DLL 2 IoCs
Processes:
trojan.exepid process 1712 trojan.exe 1712 trojan.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
trojan.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" trojan.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 1740 chrome.exe 1740 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exetrojan.exemsdcsc.exedescription pid process Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeIncreaseQuotaPrivilege 1712 trojan.exe Token: SeSecurityPrivilege 1712 trojan.exe Token: SeTakeOwnershipPrivilege 1712 trojan.exe Token: SeLoadDriverPrivilege 1712 trojan.exe Token: SeSystemProfilePrivilege 1712 trojan.exe Token: SeSystemtimePrivilege 1712 trojan.exe Token: SeProfSingleProcessPrivilege 1712 trojan.exe Token: SeIncBasePriorityPrivilege 1712 trojan.exe Token: SeCreatePagefilePrivilege 1712 trojan.exe Token: SeBackupPrivilege 1712 trojan.exe Token: SeRestorePrivilege 1712 trojan.exe Token: SeShutdownPrivilege 1712 trojan.exe Token: SeDebugPrivilege 1712 trojan.exe Token: SeSystemEnvironmentPrivilege 1712 trojan.exe Token: SeChangeNotifyPrivilege 1712 trojan.exe Token: SeRemoteShutdownPrivilege 1712 trojan.exe Token: SeUndockPrivilege 1712 trojan.exe Token: SeManageVolumePrivilege 1712 trojan.exe Token: SeImpersonatePrivilege 1712 trojan.exe Token: SeCreateGlobalPrivilege 1712 trojan.exe Token: 33 1712 trojan.exe Token: 34 1712 trojan.exe Token: 35 1712 trojan.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeIncreaseQuotaPrivilege 1784 msdcsc.exe Token: SeSecurityPrivilege 1784 msdcsc.exe Token: SeTakeOwnershipPrivilege 1784 msdcsc.exe Token: SeLoadDriverPrivilege 1784 msdcsc.exe Token: SeSystemProfilePrivilege 1784 msdcsc.exe Token: SeSystemtimePrivilege 1784 msdcsc.exe Token: SeProfSingleProcessPrivilege 1784 msdcsc.exe Token: SeIncBasePriorityPrivilege 1784 msdcsc.exe Token: SeCreatePagefilePrivilege 1784 msdcsc.exe Token: SeBackupPrivilege 1784 msdcsc.exe Token: SeRestorePrivilege 1784 msdcsc.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
Processes:
chrome.exepid process 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
msdcsc.exepid process 1784 msdcsc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1740 wrote to memory of 2312 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2312 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2312 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2772 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2700 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2700 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2700 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2824 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2824 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2824 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2824 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2824 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2824 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2824 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2824 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2824 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2824 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2824 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2824 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2824 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2824 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2824 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2824 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2824 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2824 1740 chrome.exe chrome.exe PID 1740 wrote to memory of 2824 1740 chrome.exe chrome.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://pixeldrain.com/u/FuAAHohP1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7059758,0x7fef7059768,0x7fef70597782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1292,i,18039952378909914114,5292702689528871350,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1520 --field-trial-handle=1292,i,18039952378909914114,5292702689528871350,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1292,i,18039952378909914114,5292702689528871350,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2208 --field-trial-handle=1292,i,18039952378909914114,5292702689528871350,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2216 --field-trial-handle=1292,i,18039952378909914114,5292702689528871350,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2840 --field-trial-handle=1292,i,18039952378909914114,5292702689528871350,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3656 --field-trial-handle=1292,i,18039952378909914114,5292702689528871350,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3508 --field-trial-handle=1292,i,18039952378909914114,5292702689528871350,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3864 --field-trial-handle=1292,i,18039952378909914114,5292702689528871350,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3964 --field-trial-handle=1292,i,18039952378909914114,5292702689528871350,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4020 --field-trial-handle=1292,i,18039952378909914114,5292702689528871350,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3988 --field-trial-handle=1292,i,18039952378909914114,5292702689528871350,131072 /prefetch:82⤵
-
C:\Users\Admin\Downloads\trojan.exe"C:\Users\Admin\Downloads\trojan.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"3⤵
- Modifies firewall policy service
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2696 --field-trial-handle=1292,i,18039952378909914114,5292702689528871350,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=748 --field-trial-handle=1292,i,18039952378909914114,5292702689528871350,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=2064 --field-trial-handle=1292,i,18039952378909914114,5292702689528871350,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 --field-trial-handle=1292,i,18039952378909914114,5292702689528871350,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=2432 --field-trial-handle=1292,i,18039952378909914114,5292702689528871350,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --mojo-platform-channel-handle=1120 --field-trial-handle=1292,i,18039952378909914114,5292702689528871350,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE"C:\Program Files (x86)\Microsoft Office\Office14\POWERPNT.EXE" /s "C:\Users\Admin\Desktop\SyncUse.ppsm"1⤵
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56e83aad70635391ada5f93615446a8f8
SHA1823d7c74b566a175f7bcdff39c355e42ed01ee43
SHA256f3f3eff5780760a264f8d3431703fa0e7e3a6d4e9cfe9ba0d52db9b689d10fa5
SHA5127ea79a909e0220a4b8b32b8efe750c74801631b56b012fd17bcee2f4024f241635286d173d8f8adb7793649ecbfce50f274eb9fac44e37021a7181ecf4fe3d0f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5974bea3536d4c06380124f0e91c6bdfc
SHA131ccb9e17ae2b7971c4e016982009be9cecb1a91
SHA25644ee671f2f52c069a2f64fde609569a4c71e8e84a1b23490c4552314abb4bdfd
SHA512209601601e4e18a0ceb84fb03d6773cb16aad622a241f9f44fde71fb2dcd86e51b96847b72bcb778bca6a1c3182959d2eb2804f7fcb4bed738802e62eaa35698
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5bd8f3622d73f2d421569ee3bd8ddf76b
SHA1fa114bdb9227047b6a604277cc05b4b149d3f506
SHA2563865a0fd62bbf137085f309f19539034fb00a50a6c8cc4b9ef563b5779454560
SHA512c3f6eb51f68dc0908b91545d6179d75bd0c7f84801c569eb2ee51ddd7e088bf5b2adc560679ff0b7c8fde5657c774df73ed039f420678de9666f643ae7cc42a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58d96c21dcbd236b606f46e19d16171c4
SHA1afa9cb579ccf5e1d3881114a9cc4d3652e4bc225
SHA256d9a1676c748a1eedca17865805524c96170a4a6eac1fe2ad33cfb789ac7c8c0a
SHA5123f78cc505a8132527c00caf7c15e445d3097c5ad5dec9baf71e9837cce336bd79f4071979ae34a00cf522f25df3d8cde785aeb646b6eb742bd389b469f17e959
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5daa55117a4f86c70647326b83a6bd290
SHA1be5dd4a7f55a14eef319cf73cf1da8e529848cb8
SHA256821a4f39cc0a00992a59d8da999585e58f486984235c4a0c0c492237c0b1a65d
SHA5124d1c9d1e9363d79c8aa20e44994019150fc6a3d30113af49bfd8b078f498ff5de82059169f9bdb4a35598c1c34c50aceef19c63f6e5e14ae36cd06a53d46d4ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD558a2a56e2b1e82c6969ad3d1de5f65d2
SHA1851a62c04c1dc4b2ff3b22daafab1c9e435b13eb
SHA2565204a939df68a338f52db4ebc490a262768d566b4294056d0b3616549f2e0f07
SHA5125697c129ba42ac8506d0792aae20aa33f62c5fe15317e5292debb4a2f7f00f14d049299009147690f73dd0ffd1a627aa17aa2bb3a4bb7a5d477d7ea9d4df6f6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD511ff1169e395c99e34ad269c4d23adb5
SHA11a4f18832894989810cbded41cd54ba79b6c099f
SHA256eb7db8737e9762f4fe5d6a6b94e9795834126df2287247bb14d6ce815b250d46
SHA512d7c740a4b002a568377099557b1ec2cecc047ea81cc4deda829b035b843c479e6a92255970ff8c622c2fb06c770f805a94be9f70a039ec8f5185d29003c7cd8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c1a8f48c7b4f8e81c2293e199984480d
SHA18345e530817e4a38c36ae9e660da17d60fbb0b53
SHA25667d4f7437f944193839119dc299bddd95f7567a1283c4ff1fc7bc858df899280
SHA5123877c78d4398f8ce97c27206584399f40683ff10dccf87134ae5fc2f5ad9257cf88446f4d1e1e19898d7b4c7ea6e6beb65de181fc4b196bc8d1dc90efb9c7a09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53f0f9d36884061361134882330bdb51a
SHA1e5cafde4e88f56cca8c82b8f203fb44b0fab3615
SHA2568752bc1320c79d224943344ea0dfd6006d143dbcca9c8c3a983e7af7b0998315
SHA5128728ecc33ab91bf0b90526c220de4565b1283eac151abae4e99e96d38a4ae54c3afd3eaa787647f619a702e1f3b98d37cdc99331ebec943cdd710183541ecdd8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\2431faa7-9ff9-4208-a747-5dc92b4f30c0.tmpFilesize
5KB
MD562b4bee7ae00796f77d0fef7fd513ddc
SHA1761bf552bb664a0696eb63ca597abf188da4eeb3
SHA25681d67522367dd8a8e854fb50a47fa5ec5e6e91d6be2a58f7c73b03eac4b91155
SHA5120cbfa3664e0bea21def547024bf010756d3aac3d9b68ebf8140b4cd9333ea6119ba794868fda109aabfadbe1e497dc96ebe499a1ae87498277554ae1af96f04a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000009Filesize
658KB
MD53b21d929c4170274009ebb8331ac992e
SHA105801dba1a99311b1e0dd0110a67263e5e5d0352
SHA2565b064098cdfc8fa7ae64e43ea221a34ccc8fcaca1139a81db11075382a46ca52
SHA512a752f07485e399c72fc3511c28635b70ae10e15b66acf087c51409f29f5ab4aa5912177b2744e1e62854f5655a50d63d048e4286ae1aaf9e75628ffdd4ef51c1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
96B
MD55cb4336842f33f06f4d3e009818c8233
SHA1359b370cdceb9bc9dd35d28474a1e42035029a99
SHA256aea17379d06fdccaf42345d24d53d73b6df569c7e163c7b0ba9b23512ff3fff8
SHA512c54b949f1d3fec64ce625bb5cc14d0be5ebb39a2112e6364cff0a4455cc783f92b36234b1fb1d2d400042832f3e83bf2ff9a5e5c566273b18ba55688e4a99953
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
527B
MD518c54a93331c452df71a9aef53a65190
SHA117e54548f186ca546e20d1767a4225208bdedd2f
SHA2566ad99c39006533455857e907099931f172bbf20f54f66cb365e4a25eb58af5f6
SHA512c6d39d8124dcabeccba760d04b98f94a73d801a3a10d4c83b27e3c745eac26809f1a3f2f6e99ccc381af9f24113e3b3fc7c69d78fb7cfb4e8b679a9250591032
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
527B
MD536977a07c1eba94c5c35105eb824d826
SHA124754c7d355e31db61d5e1fae93abf4c204d42de
SHA256d324110d45b03072fab0953480d2be94d2a8dd55609ba5b9ac48ea36ea0e52db
SHA512296db3d3942e5333ac8c04aea02b7b4c964bf9b6f8a95f21078ad8aa259d4ed80b4058db602080331fdb2b2ff827cdab4755c71a74347e1d5f5e8fe0900a6c14
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
527B
MD5180c572a1d9390e9394d488c9ea4a547
SHA1002ae588344a79098c41f75516f2e9d12445ded0
SHA25668daa0aa9d183a3957be5133c5e9ea20638bfff6c7ffd9633722f862da55a1bc
SHA51242f3b141a4a583cc170c2dde0bd83df68928561d8f21d306ae21de78dc979cf31e34f7530ea07302ba9e80fe03964e4479d1eb6a9f04c31f8fcbad585437957d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
527B
MD5ebf4c431ae3b930661d62119129d32be
SHA19515aca760dc63307865cb08d06f5221a0384ed2
SHA2565511d47e2ea339d1f4c9f8ed8832838984cb1f0af380695e2bf3704b4f5d8160
SHA512a63a1a9844214c31fb4323c0f7fbe56dafcac2bc93c0733f86769ad7ded22c22a3c853c9eeb676014096971807c7c4336caae8329b125b8e8b67b9161602467a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
527B
MD514ad9d6c74cda4fc559912091d62078e
SHA1784d74221d17a31b5389f48a8976851e49953325
SHA25608ff67e35ac97f874f61b80e3c04c06139a7b2a45b3f4575fa5f6d8790aed4dc
SHA51217f37ceb9ddc22dcbd4ef8863a057133627054d0a607853cc5ea95472310f47d01a0ba9aad620ff8a858a6db4a7da4c37cc6e0775cee9c8e5345478ab89e6545
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
527B
MD53451b1c267fc498c36ac6fa191b921f7
SHA1eec751eee65a58705977d5d508f424f5b1fcdb7c
SHA2563621b35522dd68650b8dd6ae230a947b1aad797cabbfc3dbbfc2954c9a37d355
SHA512fc148186ed57eab9b798a8680990223850927ad12854b4d3dda225def98cdce10d699ba84045a546a0c20cc73700715da6d909dbf725de042e48fbc158470a46
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
527B
MD5776a434e98df2e4cedce003b6c329fe8
SHA1917924c0cf109579c91f603813067bd691be75b1
SHA2564e733aa33b4c9b084d6f48bb677d13fa74f56fbff3aeff9a84c8f612fcfa246b
SHA51296741e3438592ae667c7bb539113159e33015dc76c51ba6d3aaac9e6996b5a821537a6fa00653060f56ccbacee2e4be4e7689e4f67d64a27e91104736644d999
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
527B
MD5a9e6ab32c10b85751c83f313eaaaba0c
SHA128485c76a6254f7b843673f43b531448527ba368
SHA256700f6566a0d1812d8fb3361a1bd79c61d5867b81a836ab9e8d971a874262bd49
SHA512b1672891ddc0ef80a712f0e6f072dd3a5a2fb1496e02404d971ba834a519efcbc4bfb97f15d1e73deb3a2be57b0c4aab7c67700e80d6b5273d13b9c1916321cf
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
527B
MD591d35d0bc89e32b2948a52aaa489deef
SHA14864230160317e72cae3ac17d5688882476832bc
SHA256188ff7fac3aa36ec96075da297e375c672eca9e78d9faafbf011f67f80ed495b
SHA51248f476696ed3db40b83092a9470ac13940a6021fb81ef03e25ed7a0c7310d6b5ccc96e76d94a340df9bfa37019008d06527ff49cbbf9efef375b01ca55423518
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
525B
MD53727ce0c37c152238ba0308df29563a4
SHA17615acc198463d3bf2334eb903b37aaf87e6730d
SHA25647f4d119060818c2effcd2c9164c3b7b3b1587a974339c84c3f7f01c609fafc8
SHA5128ccf596d4822aa0827cdb7f0ff9f02a269800789f260dd9b5d6c28819156f58450fe264041caaebf4e4d115e38c30e2243e71a97c031f602b589e3ba1f080a26
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
525B
MD5c76cd3220d4515a910df3c08ac4b4487
SHA1314ec9bdf14d992674e67a4cba3cc2b8193dcc30
SHA256dbcdac0507e03192b81c222004f6f02610ab83a3389c1334a3fa43e310f91932
SHA5127eb7411f038f3f2a50784b1d8aa78dc9725e4ab18cade2dabf4f795110baeb1702560b981df9c78bc90133784eee390bdda1debbda3ad31ab864c8ee7d6337f7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
527B
MD5919a3dbff2b2d9b576e4784e52a268a0
SHA1226c0e44738271715390e26cff9ebe32b00d1822
SHA256ff0d8ff9dd39bf1569793fbf6bd2f04336b8e93fcdad04e41dcc68e1c727a3ff
SHA51283de21f6293710e453d7bc649c3877b750651fd91641f7b755ff15acb94618613fbef945059acf2dfc747bbeb9f22cb5b5a3232fabb46a5f3a5e0cf79da1c229
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
527B
MD50280903b9a894db47385edcbfd5ef1ca
SHA19d0f4284db9510484f49b4502d2641259903888a
SHA25691a5d9e3e50884e43edbbaa1eea95a9e7fb411f3e80876624e73ac0c4ce17928
SHA51218a1a5b242918d2a3752006ca0007414430414143196a2830863e569129e9c143dc92ca4af592a24c2df83a164f2c494b97819bcb5ccd06044d5d45a641b996d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5e4cd29cce04ee3559858e2fa915fc4b2
SHA131c508d77b2082b4e295d484c75b770db92b305d
SHA2567080345855b81712da9cf128bba9d9ff28a4948eabecd6cc59f535021a628d64
SHA512fb0317b6f37e0eac54c269741dc451149ce12dba58c68ee5091f737c7cfa57b653ed69ecfcca2be9619621f94f9e51378b486fbcc64d2519385a07bc1083fe98
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5bb8266d3526d3bc5c3887336c0289b5b
SHA16466e9baa45bb68aebcaf8351f6dc9a4251b64b4
SHA256928936a4035cc646eb190206f9e4aa8c4720bac3a0c64124aa65d2a84c45e0d8
SHA512359356d183f8f98e7733fba9e815ab246626ce9b333b50b75cffc4a44eae4b9b8324a80eb70c2364dd7f5d05ae6ab9ccbceb990be5477ec563fc6c8e26b80e82
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5618d0fd85362b820167f25078eeff2ae
SHA165fdaa36d7e1150b21946353c819c787af8d4499
SHA2565fbb4c47ead32a4fab714f1c75da5bd99c7547f043ddf211142db2cadfd2433d
SHA5128323f5f6a9c5ed9c01737ae79c77278376f564c6338520f370e5d582a6bf02bdaed87d20a4aaa1ce8602a68f3f5e4c65a965431b10c132639c23673f398984ea
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD50c1db203483f427ac1c6845993fda710
SHA1404dce6dfc6d4ad89438c001171879af5244d808
SHA256f41bdfc26ccb37c8a110f8ddafd8d5120a197616aeefa683c8852256796de2fe
SHA512234fe07c761d34781c3f8d8b5d1394a1f79b28d6b1558d59ac391d91d9dca41d475352e2c87748ae5ac36d816d71c4ba61538f7c5d8864b55802e17528261f24
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD54644961c2372de2e385cad4c15a6c2af
SHA1fe89fd2814f80ca5c7b066a8ff4ab32c0c08e7a9
SHA256b6fb0b5e3b6927b7f8a3494de62a9b8cba5f42653465b5bed4f77355e3a6e38b
SHA5127dd347e582dad9c6c8eedbe4e806461a847351b7566f9231ddd82e5295aa3fe179ff231e3d684ffd84c5621ce7727f779feaf089497bc848b10a23f85b8fb0e4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
6KB
MD5c64f0fe6a220fa30ab0c0a49c5d795e2
SHA14093490c5e3b6517b5496f29aaa1606cf06ee876
SHA256f079d3b11e280f202ae75a157adeab21ce149893852e93056ac99a2c93dfb226
SHA5125b00dfad9f52c0c586da9e654f553f88db0c524342635764280b2cd36447b8fd9f71f7b8ca77a1c63aeb436eb878a398fb55f56a7a918dbea5e3c3a96dea1b5f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmpFilesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Temp\Cab58FB.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\Tar597B.tmpFilesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
\??\pipe\crashpad_1740_EVAEXDUSNLTZRBGYMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1712-167-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/1712-181-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1784-220-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1784-205-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1784-288-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1784-327-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1784-399-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1784-278-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1784-270-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1784-488-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1784-489-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1784-262-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1784-261-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1784-246-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1784-913-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1784-908-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1784-907-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1784-906-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1784-179-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/1784-221-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1784-881-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1784-318-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1784-889-0x0000000001D20000-0x0000000001D21000-memory.dmpFilesize
4KB
-
memory/1784-197-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/1784-898-0x0000000000400000-0x00000000004B2000-memory.dmpFilesize
712KB
-
memory/2948-229-0x000000002D241000-0x000000002D242000-memory.dmpFilesize
4KB
-
memory/2948-230-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/2948-231-0x0000000071ECD000-0x0000000071ED8000-memory.dmpFilesize
44KB
-
memory/2948-244-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/2948-245-0x0000000071ECD000-0x0000000071ED8000-memory.dmpFilesize
44KB