Analysis
-
max time kernel
111s -
max time network
124s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
15-04-2024 10:03
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://d3lv2i75c3ujgq.cloudfront.net/main/in/v2.277.77.60.35
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
https://d3lv2i75c3ujgq.cloudfront.net/main/in/v2.277.77.60.35
Resource
win11-20240412-en
General
-
Target
https://d3lv2i75c3ujgq.cloudfront.net/main/in/v2.277.77.60.35
Malware Config
Signatures
-
Cobalt Strike reflective loader 1 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule C:\ProgramData\ReasonLabs\EPP\SignaturesYFS.dat.tmp cobalt_reflective_dll -
Cobaltstrike
Detected malicious payload which is part of Cobaltstrike.
-
Detect ZGRat V1 3 IoCs
Processes:
resource yara_rule C:\Program Files\ReasonLabs\EPP\mc.dll family_zgrat_v1 C:\Program Files\ReasonLabs\EPP\rsEngine.Core.dll family_zgrat_v1 behavioral1/memory/2316-1342-0x000002B31FE50000-0x000002B31FEA4000-memory.dmp family_zgrat_v1 -
Downloads MZ/PE file
-
Drops file in Drivers directory 4 IoCs
Processes:
RAVEndPointProtection-installer.exedescription ioc process File created C:\Windows\system32\drivers\rsCamFilter020502.sys RAVEndPointProtection-installer.exe File created C:\Windows\system32\drivers\rsKernelEngine.sys RAVEndPointProtection-installer.exe File created C:\Windows\system32\drivers\rsElam.sys RAVEndPointProtection-installer.exe File opened for modification C:\Windows\system32\drivers\rsElam.sys RAVEndPointProtection-installer.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
rsAppUI.exersAppUI.exersAppUI.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Control Panel\International\Geo\Nation rsAppUI.exe Key value queried \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Control Panel\International\Geo\Nation rsAppUI.exe Key value queried \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Control Panel\International\Geo\Nation rsAppUI.exe -
Executes dropped EXE 28 IoCs
Processes:
uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.exeuconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmpcomponent0.exeOperaSetup.exeOperaSetup.exeOperaSetup.exed2fnaao1.exeOperaSetup.exeOperaSetup.exeRAVEndPointProtection-installer.exersSyncSvc.exersSyncSvc.exersWSC.exersWSC.exersClientSvc.exersClientSvc.exersEngineSvc.exersEngineSvc.exeAssistant_109.0.5097.45_Setup.exe_sfx.exeassistant_installer.exeassistant_installer.exersHelper.exeEPP.exersAppUI.exersAppUI.exersAppUI.exersAppUI.exersAppUI.exepid process 992 uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.exe 4464 uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmp 3064 component0.exe 3116 OperaSetup.exe 984 OperaSetup.exe 652 OperaSetup.exe 1564 d2fnaao1.exe 5032 OperaSetup.exe 2276 OperaSetup.exe 3432 RAVEndPointProtection-installer.exe 512 rsSyncSvc.exe 3592 rsSyncSvc.exe 5008 rsWSC.exe 2656 rsWSC.exe 4604 rsClientSvc.exe 880 rsClientSvc.exe 2316 rsEngineSvc.exe 212 rsEngineSvc.exe 4760 Assistant_109.0.5097.45_Setup.exe_sfx.exe 4048 assistant_installer.exe 1212 assistant_installer.exe 5568 rsHelper.exe 5600 EPP.exe 5632 rsAppUI.exe 6072 rsAppUI.exe 6112 rsAppUI.exe 6140 rsAppUI.exe 5192 rsAppUI.exe -
Loads dropped DLL 26 IoCs
Processes:
OperaSetup.exeOperaSetup.exeOperaSetup.exed2fnaao1.exeOperaSetup.exeOperaSetup.exeRAVEndPointProtection-installer.exeassistant_installer.exeassistant_installer.exersEngineSvc.exersAppUI.exersAppUI.exersAppUI.exersAppUI.exersAppUI.exepid process 3116 OperaSetup.exe 984 OperaSetup.exe 652 OperaSetup.exe 1564 d2fnaao1.exe 5032 OperaSetup.exe 2276 OperaSetup.exe 3432 RAVEndPointProtection-installer.exe 3432 RAVEndPointProtection-installer.exe 4048 assistant_installer.exe 4048 assistant_installer.exe 1212 assistant_installer.exe 1212 assistant_installer.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 5632 rsAppUI.exe 5632 rsAppUI.exe 5632 rsAppUI.exe 6072 rsAppUI.exe 6112 rsAppUI.exe 6072 rsAppUI.exe 6072 rsAppUI.exe 6072 rsAppUI.exe 6072 rsAppUI.exe 6140 rsAppUI.exe 212 rsEngineSvc.exe 5192 rsAppUI.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\GrpConv = "grpconv -o" rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 5 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
OperaSetup.exeOperaSetup.exersEngineSvc.exedescription ioc process File opened (read-only) \??\D: OperaSetup.exe File opened (read-only) \??\F: OperaSetup.exe File opened (read-only) \??\D: OperaSetup.exe File opened (read-only) \??\F: OperaSetup.exe File opened (read-only) \??\F: rsEngineSvc.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\ProgramData\ReasonLabs\EPP\SignaturesYFS.dat.tmp autoit_exe -
Drops file in Program Files directory 64 IoCs
Processes:
RAVEndPointProtection-installer.exersEngineSvc.exedescription ioc process File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\locales\en-GB.pak RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\locales\ro.pak RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\System.Runtime.Serialization.Formatters.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\System.Xml.XPath.XDocument.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\version RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\EDR\OSExtensions.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\EDR\rsEngine.Utilities.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\rsEngine.Scan.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\System.Collections.dll RAVEndPointProtection-installer.exe File opened for modification C:\Program Files\ReasonLabs\EPP\rsEngineSvc.InstallLog rsEngineSvc.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\locales\ar.pak RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\vk_swiftshader_icd.json RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\locales\ml.pak RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\Microsoft.Bcl.HashCode.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\System.IO.IsolatedStorage.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\System.ObjectModel.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\x64\lz4_x64.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\chrome_100_percent.pak RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\rsLogger.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\x64\7z64.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\locales\de.pak RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\locales\es.pak RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\locales\sv.pak RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\rsEngine.Core.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\System.Collections.Concurrent.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\System.Xml.XDocument.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\libGLESv2.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\EDR\amd64\vcruntime140.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\System.Net.WebSockets.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\System.Reflection.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\locales\hi.pak RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\EDR\Microsoft.Diagnostics.Tracing.TraceEvent.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\System.IO.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\System.Reflection.Extensions.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\vulkan-1.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\ui\app.asar.sig RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\Microsoft.Diagnostics.FastSerialization.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\rsEngineSvc.RPC.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\System.Threading.Tasks.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\chrome_200_percent.pak RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\libEGL.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\elam\rsElam.inf RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\InstallerLib.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\rsRemediation.exe.config RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\ARM64\msdia140.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\System.Security.Cryptography.Csp.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\x64\rsJournal-x64.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\locales\it.pak RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\rsEngine.Scan.Detections.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\System.Net.Http.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\System.Net.NameResolution.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\locales\zh-CN.pak RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\rsEngine.Scan.OnDemand.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\System.Resources.Reader.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\System.Resources.Writer.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\v8_context_snapshot.bin RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\locales\es-419.pak RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\locales\he.pak RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\Common\Client\v1.4.2\locales\nl.pak RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\NAudio.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\rsClient.Protection.Microphone.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\rsEngine.Data.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\rsEngine.Loggers.Application.dll RAVEndPointProtection-installer.exe File created C:\Program Files\ReasonLabs\EPP\System.Console.dll RAVEndPointProtection-installer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3720 4464 WerFault.exe uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmp 1612 4464 WerFault.exe uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmp -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmprunonce.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmp Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmp Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 runonce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz runonce.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 46 IoCs
Processes:
rsWSC.exersEngineSvc.exechrome.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs rsWSC.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\windows\CurrentVersion\Internet Settings\Connections rsEngineSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs rsWSC.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates rsWSC.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1a\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs rsWSC.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133576490097996918" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs rsWSC.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust rsWSC.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings chrome.exe -
Processes:
rsEngineSvc.exeOperaSetup.exersWSC.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2 rsEngineSvc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 040000000100000010000000be954f16012122448ca8bc279602acf5030000000100000014000000f40042e2e5f7e8ef8189fed15519aece42c3bfa21d0000000100000010000000e78921f81cea4d4105d2b5f4afae0c78140000000100000014000000c87ed26a852a1bca1998040727cf50104f68a8a2090000000100000016000000301406082b0601050507030306082b060105050703086200000001000000200000005367f20c7ade0e2bca790915056d086b720c33c1fa2a2661acf787e3292e12700b00000001000000800000004d006900630072006f0073006f006600740020004900640065006e007400690074007900200056006500720069006600690063006100740069006f006e00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f0072006900740079002000320030003200300000000f000000010000003000000041ce925678dfe0ccaa8089263c242b897ca582089d14e5eb685fca967f36dbd334e97e81fd0e64815f851f914ade1a1e2000000001000000d0050000308205cc308203b4a00302010202105498d2d1d45b1995481379c811c08799300d06092a864886f70d01010c05003077310b3009060355040613025553311e301c060355040a13154d6963726f736f667420436f72706f726174696f6e314830460603550403133f4d6963726f736f6674204964656e7469747920566572696669636174696f6e20526f6f7420436572746966696361746520417574686f726974792032303230301e170d3230303431363138333631365a170d3435303431363138343434305a3077310b3009060355040613025553311e301c060355040a13154d6963726f736f667420436f72706f726174696f6e314830460603550403133f4d6963726f736f6674204964656e7469747920566572696669636174696f6e20526f6f7420436572746966696361746520417574686f72697479203230323030820222300d06092a864886f70d01010105000382020f003082020a0282020100b3912a07830667fd9e9de0c7c0b7a4e642047f0fa6db5ffbd55ad745a0fb770bf080f3a66d5a4d7953d8a08684574520c7a254fbc7a2bf8ac76e35f3a215c42f4ee34a8596490dffbe99d814f6bc2707ee429b2bf50b9206e4fd691365a89172f29884eb833d0ee4d771124821cb0dedf64749b79bf9c9c717b6844fffb8ac9ad773674985e386bd3740d02586d4deb5c26d626ad5a978bc2d6f49f9e56c1414fd14c7d3651637decb6ebc5e298dfd629b152cd605e6b9893233a362c7d7d6526708c42ef4562b9e0b87cceca7b4a6aaeb05cd1957a53a0b04271c91679e2d622d2f1ebedac020cb0419ca33fb89be98e272a07235be79e19c836fe46d176f90f33d008675388ed0e0499abbdbd3f830cad55788684d72d3bf6d7f71d8fdbd0dae926448b75b6f7926b5cd9b952184d1ef0f323d7b578cf345074c7ce05e180e35768b6d9ecb3674ab05f8e0735d3256946797250ac6353d9497e7c1448b80fdc1f8f47419e530f606fb21573e061c8b6b158627497b8293ca59e87547e83f38f4c75379a0b6b4e25c51efbd5f38c113e6780c955a2ec5405928cc0f24c0ecba0977239938a6b61cdac7ba20b6d737d87f37af08e33b71db6e731b7d9972b0e486335974b516007b506dc68613dafdc439823d24009a60daba94c005512c34ac50991387bbb30580b24d30025cb826835db46373efae23954f6028be37d55ba50203010001a3543052300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414c87ed26a852a1bca1998040727cf50104f68a8a2301006092b06010401823715010403020100300d06092a864886f70d01010c05000382020100af6adde619e72d9443194ecbe9509564a50391028be236803b15a252c21619b66a5a5d744330f49bff607409b1211e90166dc5248f5c668863f44fcc7df2124c40108b019fdaa9c8aef2951bcf9d05eb493e74a0685be5562c651c827e53da56d94617799245c4103608522917cb2fa6f27ed469248a1e8fb0730dcc1c4aabb2aaeda79163016422a832b87e3228b367732d91b4dc31010bf7470aa6f1d74aed5660c42c08a37b40b0bc74275287d6be88dd378a896e67881df5c95da0feb6ab3a80d71a973c173622411eac4dd583e63c38bd4f30e954a9d3b604c3327661bbb018c52b18b3c080d5b795b05e514d22fcec58aae8d894b4a52eed92dee7187c2157dd5563f7bf6dcd1fd2a6772870c7e25b3a5b08d25b4ec80096b3e18336af860a655c74f6eaec7a6a74a0f04beeef94a3ac50f287edd73a3083c9fb7d57bee5e3f841cae564aeb3a3ec58ec859accefb9eaf35618b95c739aafc577178359db371a187254a541d2b62375a3439ae5777c9679b7418dbfecdc80a09fd17775585f3513e0251a670b7dce25fa070ae46121d8d41ce507c63699f496d0c615fe4ecdd7ae8b9ddb16fd04c692bdd488e6a9a3aabbf764383b5fcc0cd035be741903a6c5aa4ca26136823e1df32bbc975ddb4b783b2df53bef6023e8f5ec0b233695af9866bf53d37bb8694a2a966669c494c6f45f6eac98788880065ca2b2eda2 rsEngineSvc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 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 rsEngineSvc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 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 rsEngineSvc.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\F40042E2E5F7E8EF8189FED15519AECE42C3BFA2\Blob = 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 rsEngineSvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4 OperaSetup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 OperaSetup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E rsWSC.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 rsWSC.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 OperaSetup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E\Blob = 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 rsWSC.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 0f00000001000000300000004ea1b34b10b982a96a38915843507820ad632c6aad8343e337b34d660cd8366fa154544ae80668ae1fdf3931d57e1996530000000100000040000000303e301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030106082b060105050703080b00000001000000320000004400690067006900430065007200740020005400720075007300740065006400200052006f006f0074002000470034000000620000000100000020000000552f7bdcf1a7af9e6ce672017f4f12abf77240c78e761ac203d1d9d20ac89988140000000100000014000000ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f1d0000000100000010000000a86dc6a233eb339610f3ed414927c559030000000100000014000000ddfb16cd4931c973a2037d3fc83a4d7d775d05e42000000001000000940500003082059030820378a0030201020210059b1b579e8e2132e23907bda777755c300d06092a864886f70d01010c05003062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f74204734301e170d3133303830313132303030305a170d3338303131353132303030305a3062310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d3121301f060355040313184469676943657274205472757374656420526f6f7420473430820222300d06092a864886f70d01010105000382020f003082020a0282020100bfe6907368debbe45d4a3c3022306933ecc2a7252ec9213df28ad859c2e129a73d58ab769acdae7b1b840dc4301ff31ba43816eb56c6976d1dabb279f2ca11d2e45fd6053c520f521fc69e15a57ebe9fa95716595572af689370c2b2ba75996a733294d11044102edf82f30784e6743b6d71e22d0c1bee20d5c9201d63292dceec5e4ec893f821619b34eb05c65eec5b1abcebc9cfcdac34405fb17a66ee77c848a86657579f54588e0c2bb74fa730d956eeca7b5de3adc94f5ee535e731cbda935edc8e8f80dab69198409079c378c7b6b1c4b56a183803108dd8d437a42e057d88f5823e109170ab55824132d7db04732a6e91017c214cd4bcae1b03755d7866d93a31449a3340bf08d75a49a4c2e6a9a067dda427bca14f39b5115817f7245c468f64f7c169887698763d595d4276878997697a48f0e0a2121b669a74cade4b1ee70e63aee6d4ef92923a9e3ddc00e4452589b69a44192b7ec094b4d2616deb33d9c5df4b0400cc7d1c95c38ff721b2b211b7bb7ff2d58c702c4160aab1631844951a76627ef680b0fbe864a633d18907e1bdb7e643a418b8a67701e10f940c211db2542925896ce50e52514774be26acb64175de7aac5f8d3fc9bcd34111125be51050eb31c5ca72162209df7c4c753f63ec215fc420516b6fb1ab868b4fc2d6455f9d20fca11ec5c08fa2b17e0a2699f5e4692f981d2df5d9a9b21de51b0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020186301d0603551d0e04160414ecd7e382d2715d644cdf2e673fe7ba98ae1c0f4f300d06092a864886f70d01010c05000382020100bb61d97da96cbe17c4911bc3a1a2008de364680f56cf77ae70f9fd9a4a99b9c9785c0c0c5fe4e61429560b36495d4463e0ad9c9618661b230d3d79e96d6bd654f8d23cc14340ae1d50f552fc903bbb9899696bc7c1a7a868a427dc9df927ae3085b9f6674d3a3e8f5939225344ebc85d03caed507a7d62210a80c87366d1a005605fe8a5b4a7afa8f76d359c7c5a8ad6a23899f3788bf44dd2200bde04ee8c9b4781720dc01432ef30592eaee071f256e46a976f92506d968d687a9ab236147a06f224b9091150d708b1b8897a8423614229e5a3cda22041d7d19c64d9ea26a18b14d74c19b25041713d3f4d7023860c4adc81d2cc3294840d0809971c4fc0ee6b207430d2e03934108521150108e85532de7149d92817504de6be4dd175acd0cafb41b843a5aad3c305444f2c369be2fae245b823536c066f67557f46b54c3f6e285a7926d2a4a86297d21ee2ed4a8bbc1bfd474a0ddf67667eb25b41d03be4f43bf40463e9efc2540051a08a2ac9ce78ccd5ea870418b3ceaf4988aff39299b6b3e6610fd28500e7501ae41b959d19a1b99cb19bb1001eefd00f4f426cc90abcee43fa3a71a5c84d26a535fd895dbc85621d32d2a02b54ed9a57c1dbfa10cf19b78b4a1b8f01b6279553e8b6896d5bbc68d423e88b51a256f9f0a680a0d61eb3bc0f0f537529aaea1377e4de8c8121ad07104711ad873d07d175bccff3667e OperaSetup.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4\Blob = 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 OperaSetup.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 17 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exeuconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmpRAVEndPointProtection-installer.exersClientSvc.exersEngineSvc.exepid process 2544 chrome.exe 2544 chrome.exe 4464 uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmp 4464 uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmp 4464 uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmp 4464 uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmp 4464 uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmp 4464 uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmp 4464 uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmp 4464 uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmp 3432 RAVEndPointProtection-installer.exe 3432 RAVEndPointProtection-installer.exe 3432 RAVEndPointProtection-installer.exe 3432 RAVEndPointProtection-installer.exe 3432 RAVEndPointProtection-installer.exe 3432 RAVEndPointProtection-installer.exe 3432 RAVEndPointProtection-installer.exe 3432 RAVEndPointProtection-installer.exe 3432 RAVEndPointProtection-installer.exe 3432 RAVEndPointProtection-installer.exe 3432 RAVEndPointProtection-installer.exe 3432 RAVEndPointProtection-installer.exe 3432 RAVEndPointProtection-installer.exe 3432 RAVEndPointProtection-installer.exe 3432 RAVEndPointProtection-installer.exe 3432 RAVEndPointProtection-installer.exe 3432 RAVEndPointProtection-installer.exe 3432 RAVEndPointProtection-installer.exe 880 rsClientSvc.exe 880 rsClientSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe 212 rsEngineSvc.exe -
Suspicious behavior: LoadsDriver 3 IoCs
Processes:
fltmc.exepid process 4832 fltmc.exe 632 632 -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 2544 chrome.exe 2544 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe Token: SeShutdownPrivilege 2544 chrome.exe Token: SeCreatePagefilePrivilege 2544 chrome.exe -
Suspicious use of FindShellTrayWindow 46 IoCs
Processes:
chrome.exeuconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmprsAppUI.exepid process 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 4464 uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmp 5632 rsAppUI.exe 5632 rsAppUI.exe 5632 rsAppUI.exe 5632 rsAppUI.exe 5632 rsAppUI.exe 5632 rsAppUI.exe 5632 rsAppUI.exe 5632 rsAppUI.exe 5632 rsAppUI.exe 5632 rsAppUI.exe -
Suspicious use of SendNotifyMessage 33 IoCs
Processes:
chrome.exersAppUI.exepid process 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 2544 chrome.exe 5632 rsAppUI.exe 5632 rsAppUI.exe 5632 rsAppUI.exe 5632 rsAppUI.exe 5632 rsAppUI.exe 5632 rsAppUI.exe 5632 rsAppUI.exe 5632 rsAppUI.exe 5632 rsAppUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2544 wrote to memory of 2940 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2940 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 2228 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3404 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3404 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe PID 2544 wrote to memory of 3304 2544 chrome.exe chrome.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://d3lv2i75c3ujgq.cloudfront.net/main/in/v2.277.77.60.351⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffe7cc49758,0x7ffe7cc49768,0x7ffe7cc497782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1532 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2012 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2056 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3048 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5244 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5308 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5368 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5348 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4568 --field-trial-handle=1740,i,17957146657600238131,11201793424790473003,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\Downloads\uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.exe"C:\Users\Admin\Downloads\uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.exe"1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\is-EUM9V.tmp\uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmp"C:\Users\Admin\AppData\Local\Temp\is-EUM9V.tmp\uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmp" /SL5="$202B6,837550,832512,C:\Users\Admin\Downloads\uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component0.exe"C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component0.exe" -ip:"dui=ebaa0802-254d-4be1-a642-a8a5c0b06224&dit=20240415100403&is_silent=true&oc=ZB_RAV_Cross_Solo_Soft&p=fa70&a=100&b=&se=true" -i3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\d2fnaao1.exe"C:\Users\Admin\AppData\Local\Temp\d2fnaao1.exe" /silent4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\RAVEndPointProtection-installer.exe"C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\RAVEndPointProtection-installer.exe" "C:\Users\Admin\AppData\Local\Temp\d2fnaao1.exe" /silent5⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe"C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe" -i -bn:ReasonLabs -pn:EPP -lpn:rav_antivirus -url:https://update.reasonsecurity.com/v2/live -dt:106⤵
- Executes dropped EXE
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" setupapi.dll,InstallHinfSection DefaultInstall 128 C:\Program Files\ReasonLabs\EPP\x64\rsKernelEngine.inf6⤵
- Adds Run key to start application
-
C:\Windows\system32\runonce.exe"C:\Windows\system32\runonce.exe" -r7⤵
- Checks processor information in registry
-
C:\Windows\System32\grpconv.exe"C:\Windows\System32\grpconv.exe" -o8⤵
-
C:\Windows\system32\wevtutil.exe"C:\Windows\system32\wevtutil.exe" im C:\Program Files\ReasonLabs\EPP\x64\rsKernelEngineEvents.xml6⤵
-
C:\Windows\SYSTEM32\fltmc.exe"fltmc.exe" load rsKernelEngine6⤵
- Suspicious behavior: LoadsDriver
-
C:\Windows\system32\wevtutil.exe"C:\Windows\system32\wevtutil.exe" im C:\Program Files\ReasonLabs\EPP\elam\evntdrv.xml6⤵
-
C:\Program Files\ReasonLabs\EPP\rsWSC.exe"C:\Program Files\ReasonLabs\EPP\rsWSC.exe" -i -i6⤵
- Executes dropped EXE
- Modifies system certificate store
-
C:\Program Files\ReasonLabs\EPP\rsClientSvc.exe"C:\Program Files\ReasonLabs\EPP\rsClientSvc.exe" -i -i6⤵
- Executes dropped EXE
-
C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe"C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe" -i -i6⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies system certificate store
-
C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component1_extract\OperaSetup.exe"C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component1_extract\OperaSetup.exe" --silent --allusers=0 --otd=utm.medium:apb,utm.source:ais,utm.campaign:opera_new_b3⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies system certificate store
-
C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component1_extract\OperaSetup.exeC:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component1_extract\OperaSetup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.38 --initial-client-data=0x2ac,0x2b0,0x2b4,0x288,0x2b8,0x7195e1d0,0x7195e1dc,0x7195e1e84⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\OperaSetup.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\OperaSetup.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component1_extract\OperaSetup.exe"C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component1_extract\OperaSetup.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=3116 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240415100429" --session-guid=8db75a2e-1adb-4979-9231-835547731687 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=A8040000000000004⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
-
C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component1_extract\OperaSetup.exeC:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component1_extract\OperaSetup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.38 --initial-client-data=0x2a0,0x2a4,0x2a8,0x12c,0x2b8,0x70b3e1d0,0x70b3e1dc,0x70b3e1e85⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404151004291\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404151004291\assistant\Assistant_109.0.5097.45_Setup.exe_sfx.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404151004291\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404151004291\assistant\assistant_installer.exe" --version4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404151004291\assistant\assistant_installer.exe"C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404151004291\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=109.0.5097.45 --initial-client-data=0x24c,0x250,0x254,0x228,0x258,0x1556038,0x1556044,0x15560505⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 14003⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 14003⤵
- Program crash
-
C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe"C:\Program Files\ReasonLabs\Common\rsSyncSvc.exe" -pn:EPP -lpn:rav_antivirus -url:https://update.reasonsecurity.com/v2/live -bn:ReasonLabs -dt:101⤵
- Executes dropped EXE
-
C:\Program Files\ReasonLabs\EPP\rsWSC.exe"C:\Program Files\ReasonLabs\EPP\rsWSC.exe"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
-
C:\Program Files\ReasonLabs\EPP\rsClientSvc.exe"C:\Program Files\ReasonLabs\EPP\rsClientSvc.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe"C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
-
\??\c:\program files\reasonlabs\epp\rsHelper.exe"c:\program files\reasonlabs\epp\rsHelper.exe"2⤵
- Executes dropped EXE
-
\??\c:\program files\reasonlabs\EPP\ui\EPP.exe"c:\program files\reasonlabs\EPP\ui\EPP.exe" --minimized --first-run2⤵
- Executes dropped EXE
-
C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe"C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe" "c:\program files\reasonlabs\EPP\ui\app.asar" --engine-path="c:\program files\reasonlabs\EPP" --minimized --first-run3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe"C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2064 --field-trial-handle=2068,i,5434911227001465824,9983036120896757281,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:24⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe"C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP" --standard-schemes=mc --secure-schemes=mc --bypasscsp-schemes --cors-schemes --fetch-schemes --service-worker-schemes --streaming-schemes --mojo-platform-channel-handle=3104 --field-trial-handle=2068,i,5434911227001465824,9983036120896757281,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:84⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe"C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP" --standard-schemes=mc --secure-schemes=mc --bypasscsp-schemes --cors-schemes --fetch-schemes --service-worker-schemes --streaming-schemes --app-user-model-id=com.reasonlabs.epp --app-path="C:\Program Files\ReasonLabs\Common\Client\v1.4.2\resources\app.asar" --enable-sandbox --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=3288 --field-trial-handle=2068,i,5434911227001465824,9983036120896757281,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:14⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe"C:\Program Files\ReasonLabs\Common\Client\v1.4.2\rsAppUI.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP" --standard-schemes=mc --secure-schemes=mc --bypasscsp-schemes --cors-schemes --fetch-schemes --service-worker-schemes --streaming-schemes --app-user-model-id=com.reasonlabs.epp --app-path="C:\Program Files\ReasonLabs\Common\Client\v1.4.2\resources\app.asar" --enable-sandbox --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3640 --field-trial-handle=2068,i,5434911227001465824,9983036120896757281,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:14⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
-
C:\program files\reasonlabs\epp\rsLitmus.A.exe"C:\program files\reasonlabs\epp\rsLitmus.A.exe"2⤵
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\ReasonLabs\Common\rsSyncSvc.exeFilesize
797KB
MD5ded746a9d2d7b7afcb3abe1a24dd3163
SHA1a074c9e981491ff566cd45b912e743bd1266c4ae
SHA256c113072678d5fa03b02d750a5911848ab0e247c4b28cf7b152a858c4b24901b3
SHA5122c273bf79988df13f9da4019f8071cf3b4480ecd814d3df44b83958f52f49bb668dd2f568293c29ef3545018fea15c9d5902ef88e0ecfebaf60458333fcaa91b
-
C:\Program Files\ReasonLabs\EPP\InstallUtil.InstallLogFilesize
706B
MD596b9ff6f3912c7b80900084c911d2077
SHA1d0f9df560811c4b23dbc1e070e3e892fb84eb216
SHA256988d5cb0f6a46f47371c22ca392972b40f7da9a09aa0369f7e12f624d6232f1d
SHA5124df89a85afec2807bb8c07ca713d3c9f903f25ae9128371851ce247518137804f9e45555bf671f1a9504434803f2696efcaf3772a52409f93d8f8cdf3f8305ef
-
C:\Program Files\ReasonLabs\EPP\InstallerLib.dllFilesize
310KB
MD5c3b43e56db33516751b66ee531a162c9
SHA16b8a1680e9485060377750f79bc681e17a3cb72a
SHA256040b2e0dea718124b36d76e1d8f591ff0dbca22f7fb11f52a2e6424218f4ecad
SHA5124724f2f30e997f91893aabfa8bf1b5938c329927080e4cc72b81b4bb6db06fe35dae60d428d57355f03c46dd29f15db46ad2b1036247c0dcde688183ef11313a
-
C:\Program Files\ReasonLabs\EPP\System.Net.Http.dllFilesize
193KB
MD58aaffe537f6b9a0560a27f9bd548dfa2
SHA106ab3e6125707f4ebfaa9c56192efc51ffab7c88
SHA2567c94b2ba7bf96322bc0603a9fdeef31286255aef28bc0fa6183e4be65159d5ef
SHA512fa74208ec5618e6366f85f5cb6105fce1bb06fda0ad1d0a0a2eae09c9d735af54f094be510d2627d05b53aeeb48a3838f4d0e37b2af2f831e388e81fe6607024
-
C:\Program Files\ReasonLabs\EPP\elam\rsElam.sysFilesize
19KB
MD58129c96d6ebdaebbe771ee034555bf8f
SHA19b41fb541a273086d3eef0ba4149f88022efbaff
SHA2568bcc210669bc5931a3a69fc63ed288cb74013a92c84ca0aba89e3f4e56e3ae51
SHA512ccd92987da4bda7a0f6386308611afb7951395158fc6d10a0596b0a0db4a61df202120460e2383d2d2f34cbb4d4e33e4f2e091a717d2fc1859ed7f58db3b7a18
-
C:\Program Files\ReasonLabs\EPP\mc.dllFilesize
1.1MB
MD56d27fe0704da042cdf69efa4fb7e4ec4
SHA148f44cf5fe655d7ef2eafbd43e8d52828f751f05
SHA2560f74ef17c3170d6c48f442d8c81923185f3d54cb04158a4da78495c2ec31863e
SHA5122c3587acab4461568ac746b4cdf36283d4cb2abe09fc7c085615384e92f813c28cf4fcb4f39ec67860eac9c0e4a5f15021aee712d21a682f8df654968ed40ea3
-
C:\Program Files\ReasonLabs\EPP\rsClientSvc.exeFilesize
657KB
MD531d9fb62e2c93b09ea373506809b7127
SHA19f2b25d0f7853619d9bb9ada07f3f4d28eb2d01c
SHA256e20d6f35a53a65ba5922d22c47ce6ca650b9f54b4637c1fc3c3904fcf6f18d31
SHA51262cee54bfa73e4380ba44551a88070c8df9f7d0db1fb3a7e608fc4f701280436b3c9df66e0163065d42e9a1c7b67e1d2949a149b0d86fdf2d2e7fcf918f346da
-
C:\Program Files\ReasonLabs\EPP\rsEngine.Core.dllFilesize
327KB
MD59d3d8cd27b28bf9f8b592e066b9a0a06
SHA19565df4bf2306900599ea291d9e938892fe2c43a
SHA25697fe82b6ce5bc3ad96c8c5e242c86396accdf0f78ffc155ebc05f950597cdbd6
SHA512acefc1552d16be14def7043b21ec026133aabd56f90800e131733c5b0c78316a4d9dc37d6b3093e537ce1974219154e8bd32204127a4ab4d4cd5f3041c6a8729
-
C:\Program Files\ReasonLabs\EPP\rsEngine.Loggers.Application.dllFilesize
143KB
MD5f25c46924f7354d6dd841ddd323058df
SHA14e1f7e80304f60bb6d380286e4a8ffa5730691fb
SHA256a7b5a14cec1c111d8c5a39563bd3a6eb3844468e141ad35326600faa90bcafb0
SHA512c143feff18c35b4bc1c751fa157fe14d27650b24876efae40754b9691154d105b47d4d5c58ab776e2a9d9cc4d6009f3ff9b8d65c15b6cba3a2c1e1d0cb92c526
-
C:\Program Files\ReasonLabs\EPP\rsEngine.configFilesize
5KB
MD5be90740a7ccd5651c445cfb4bd162cf9
SHA1218be6423b6b5b1fbce9f93d02461c7ed2b33987
SHA25644fa685d7b4868f94c9c51465158ea029cd1a4ceb5bfa918aa7dec2c528016e4
SHA512a26869c152ed8df57b72f8261d33b909fb4d87d93dc0061bf010b69bad7b8c90c2f40a1338806c03d669b011c0cb5bbfcd429b7cd993df7d3229002becb658ad
-
C:\Program Files\ReasonLabs\EPP\rsEngineSvc.InstallLogFilesize
257B
MD52afb72ff4eb694325bc55e2b0b2d5592
SHA1ba1d4f70eaa44ce0e1856b9b43487279286f76c9
SHA25641fb029d215775c361d561b02c482c485cc8fd220e6b62762bff15fd5f3fb91e
SHA5125b5179b5495195e9988e0b48767e8781812292c207f8ae0551167976c630398433e8cc04fdbf0a57ef6a256e95db8715a0b89104d3ca343173812b233f078b6e
-
C:\Program Files\ReasonLabs\EPP\rsEngineSvc.InstallLogFilesize
660B
MD5705ace5df076489bde34bd8f44c09901
SHA1b867f35786f09405c324b6bf692e479ffecdfa9c
SHA256f05a09811f6377d1341e9b41c63aa7b84a5c246055c43b0be09723bf29480950
SHA5121f490f09b7d21075e8cdf2fe16f232a98428bef5c487badf4891647053ffef02987517cd41dddbdc998bef9f2b0ddd33a3f3d2850b7b99ae7a4b3c115b0eeff7
-
C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exeFilesize
323KB
MD5020402475fceac13f6df2037fadad1fc
SHA17aa31b7ecd3858f77d3ac0794865ca7de291c197
SHA2564a120c77a4a297ea9a28fd28e79eb63266201d9f45ddaeb606b3597ca2d3f005
SHA512d0aea0df7f13dfca7a1d10f2f7dec3702c9f3c598ed0556f9cd9cecaf1d6129b00a16065c13ed72b0bfa735b58b358649f3f63c655f294ed92c68e14840c2ecd
-
C:\Program Files\ReasonLabs\EPP\rsEngineSvc.exe.configFilesize
17KB
MD55ef4dc031d352d4cdcefaf5b37a4843b
SHA1128285ec63297232b5109587dc97b7c3ebd500a6
SHA2564b094b7bd38e5bf01900e468ddd545b42369ae510ec2366427804a57da5013a7
SHA51238b0444e4f07ad0b50891e2b0da6374b0033cb9656a4918e9eaae34e381d95671978d19abbcf2b8fdb079921b85e20dbe2c4392b15984ce6051b48b4a05a172f
-
C:\Program Files\ReasonLabs\EPP\rsWSC.InstallLogFilesize
239B
MD51264314190d1e81276dde796c5a3537c
SHA1ab1c69efd9358b161ec31d7701d26c39ee708d57
SHA2568341a3cae0acb500b9f494bdec870cb8eb8e915174370d41c57dcdae622342c5
SHA512a3f36574dce70997943d93a8d5bebe1b44be7b4aae05ed5a791aee8c3aab908c2eca3275f7ce636a230a585d40896dc637be1fb597b10380d0c258afe4e720e9
-
C:\Program Files\ReasonLabs\EPP\rsWSC.InstallLogFilesize
606B
MD543fbbd79c6a85b1dfb782c199ff1f0e7
SHA1cad46a3de56cd064e32b79c07ced5abec6bc1543
SHA25619537ccffeb8552c0d4a8e0f22a859b4465de1723d6db139c73c885c00bd03e0
SHA51279b4f5dccd4f45d9b42623ebc7ee58f67a8386ce69e804f8f11441a04b941da9395aa791806bbc8b6ce9a9aa04127e93f6e720823445de9740a11a52370a92ea
-
C:\Program Files\ReasonLabs\EPP\rsWSC.exeFilesize
203KB
MD5103f5f469e0d03308b4d8a18c2ad9b3b
SHA1c380199a6fedc9b1b6638db1264fb05818155f40
SHA2562bf7c8a5421bd74eae8ede15328c0c39a4ddf524149dee0521372fafdd2f8812
SHA512608dfa389729ee6f4fff1197eee15e2359f288937e1cbc9b044cf9abf7de06b5d135a2a4a8c5be558ad2593cb5abc0c93b14cec37dd58d2682a2234d0d1d1dee
-
C:\Program Files\ReasonLabs\EPP\ui\EPP.exeFilesize
2.2MB
MD5defbb0a0d6b7718a9b0eaf5e7894a4b0
SHA10495a5eccd8690fac8810178117bf86ea366c8c3
SHA256c3d2f7e0ad6fd26578595fb3f7c2b202ab6fba595d32dfa5c764922145db0788
SHA51255dab7ae748a668a2bb57deb6fbff07e6056d97b6f88850890610ac135b8839d3c61f4dc505d3f32cc09a3ff2ce80ce663d0c830f9f399367dc03c92ea7ca89a
-
C:\Program Files\ReasonLabs\EPP\x64\rsKernelEngine.infFilesize
2KB
MD5e8ef8570898c8ed883b4f9354d8207ae
SHA15cc645ef9926fd6a3e85dbc87d62e7d62ab8246d
SHA256edc8579dea9faf89275f0a0babea442ed1c6dcc7b4f436424e6e495c6805d988
SHA512971dd20773288c7d68fb19b39f9f5ed4af15868ba564814199d149c32f6e16f1fd3da05de0f3c2ada02c0f3d1ff665b1b7d13ce91d2164e01b77ce1a125de397
-
C:\ProgramData\ReasonLabs\EPP\SignaturesYF.dat.tmpFilesize
5.1MB
MD5d13bddae18c3ee69e044ccf845e92116
SHA131129f1e8074a4259f38641d4f74f02ca980ec60
SHA2561fac07374505f68520aa60852e3a3a656449fceacb7476df7414c73f394ad9e0
SHA51270b2b752c2a61dcf52f0aadcd0ab0fdf4d06dc140aee6520a8c9d428379deb9fdcc101140c37029d2bac65a6cfcf5ed4216db45e4a162acbc7c8c8b666cd15dd
-
C:\ProgramData\ReasonLabs\EPP\SignaturesYFS.dat.tmpFilesize
2.9MB
MD510a8f2f82452e5aaf2484d7230ec5758
SHA11bf814ddace7c3915547c2085f14e361bbd91959
SHA25697bffb5fc024494f5b4ad1e50fdb8fad37559c05e5d177107895de0a1741b50b
SHA5126df8953699e8f5ccff900074fd302d5eb7cad9a55d257ac1ef2cb3b60ba1c54afe74aee62dc4b06b3f6edf14617c2d236749357c5e80c5a13d4f9afcb4efa097
-
C:\ProgramData\ReasonLabs\EPP\SignaturesYS.dat.tmpFilesize
550KB
MD5afb68bc4ae0b7040878a0b0c2a5177de
SHA1ed4cac2f19b504a8fe27ad05805dd03aa552654e
SHA25676e6f11076cc48eb453abbdbd616c1c46f280d2b4c521c906adf12bb3129067b
SHA512ebc4c1f2da977d359791859495f9e37b05491e47d39e88a001cb6f2b7b1836b1470b6904c026142c2b1b4fe835560017641d6810a7e8a5c89766e55dd26e8c43
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1KB
MD5acb15b007f140368012c53365aff928a
SHA15bd9e426b8d41cd98333f2cf9511e57fc43112e8
SHA25632630d751d104254106c789f995e2ce22ddd3f60a202c905a6e5cdc31f86af87
SHA512a1afaca21a9781d8d7cdaf1cc3a960f9de839203ab3a82fc96463fd6d3d7ac1c0d053b3178894ddb347525f7f98459995817165e940a374b9bfea4f6e8f79db5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
1018B
MD595b1bf62086f40d53dcde917c602b67b
SHA1290c377db638b7e11f08d0b58724052c5ef00bab
SHA25683488ed76f6126c3b91debd0c55348c3db8066add332690e4133b0a9b2e8b288
SHA5123b0247c957e41725b5548c6dfe8a0aa35c1bdf0323a00ef8c987b646294fea32db55af742f745041d829134af4e33e570d84a055730fa7d6618780554b3f754f
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5d01d0ecb207bcce8fba3f05001617e31
SHA1e67f52affa4071f88e31ac854e679230f4c9d8a8
SHA256c9a8194af702255e22483849fa33ec1d528b439019406d56b63cd5314759e24e
SHA512fa3f0c82ee8a85439cbe8b7e0a4a36b3e2bbf6554e6b5a9048715331cedccb634119e5fcea548063de54bb55cf5112bdb7c4822ab21ea19b5179f54d1d3ffb57
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD599d720c76916dad10e98231249691779
SHA19e02028168aca6807e919ff82529a8eeba08a66f
SHA2566ca2f895aedcd5ce3fd285fa25e6bb224d89cdda0349e45aa4dc56fb77585428
SHA5123c25dc6cc699d79dfb12b9681620f111d45e14e995614b1254a6da55c48241d26e638703409d07ff319c7c2a5beb655aaeb8f12d6b20fa1a62094236fd58c8bd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
5KB
MD5c366d334b558838e2bd3676251613ed4
SHA1d0457ab70b0c8a68f25c3175b06e3caf567ad162
SHA256e43abd4ea370c059fa3d80124a4dac7afa3b7b1e3f2a40dc7e938fafa895902c
SHA512b460df4af6ffcb9d8c8d1a807a94eaad7eedf03d0c9f5f019ab8ad2b2360eed0264abfea3a399f20fb277a861b4546043b2d51a4fba9825d12416cb3062dbbc5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
136KB
MD5fe5510fb51281e3b4cc711bd1eb6bc22
SHA11b5a1abe6cbec64fb6c0de759ed81c9d2b932bdb
SHA2561b7b6b42b898d7f840e44a05903611fbffe8b6286f8f065e5cf1828445e3717e
SHA512c2d5e7faa05f3a1c05b8e8b64ad108aa402466dfabe166eabf37f8e3513f36b9d69bc76686fe37fee3a670ff90fa70709c03aafbfcd143031da10e24d0a9ec5e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
109KB
MD5c0e748cdb94c05df63fcacdf127be914
SHA199805c7cb961ad004a2a3c2ce97ac26943c4bd85
SHA2560ab2c5b091e8c47bf4cd40efee00a2375899a5d88bebaebea2dd0d3aa598f3c0
SHA512dfa50ff076ed910fb370c6bc7bafa7169117b32382c6ece7eb320c320fd66f96f9b3149e7e1bc67ab12b87f5df5fc607e54ca3942b25db412da55614ffa298d2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe57f7cd.TMPFilesize
105KB
MD58f824420bd96a1e35359b52083baebe4
SHA11de90febb535f05dfdd642c06052b20984a615e6
SHA256b809d8dba52d5a555f4f5c790a1911d5e73c2a557294e855d756d225de45395e
SHA512ba201655206b9a40b0de053a1a4afbdb530f63b36bb9df906746afe07d8c2245524b9b8bfe92aa5768d710ab25b8cf6fc0585403b369f921b1bbc37eef7386c0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.jsonFilesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404151004291\additional_file0.tmpFilesize
2.5MB
MD515d8c8f36cef095a67d156969ecdb896
SHA1a1435deb5866cd341c09e56b65cdda33620fcc95
SHA2561521c69f478e9ced2f64b8714b9e19724e747cd8166e0f7ab5db1151a523dda8
SHA512d6f48180d4dcb5ba83a9c0166870ac00ea67b615e749edf5994bc50277bf97ca87f582ac6f374c5351df252db73ee1231c943b53432dbb7563e12bbaf5bb393a
-
C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202404151004291\opera_packageFilesize
103.8MB
MD55014156e9ffbb75d1a8d5fc09fabdc42
SHA16968d1b5cec3039e53bbbedeee22e2d43d94c771
SHA2567a01e11e1830ba3c154e5a6c383da15938b1e48f89a2fe4045cdd260924b6802
SHA512bfc5c44881d0fa7bcbccfd530d874fa624adec50e1a16063a72de12876d2db10ca5edd6fa841ea63e9deca3ff2adf54065f50719fe051d41de92bb68edba4016
-
C:\Users\Admin\AppData\Local\Temp\d2fnaao1.exeFilesize
1.9MB
MD57df87fb6f81050b74397602985e69b0f
SHA168b6d5eb0b05749907ba3d505084969e45892889
SHA256ea4f7c9064f9b9907dab6ca9a5ba9d653c09fb99aee6fe80eac0f164bbaa7208
SHA512e2c28e5dd637addc32dc898c26636b72fe27ee247bc247f478eaa7e11968d14cd6602b24b515666832114985b1aeb7cd2d7f55e93f0101f8e2b6c569142c3c2d
-
C:\Users\Admin\AppData\Local\Temp\is-EUM9V.tmp\uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.tmpFilesize
3.1MB
MD5b73671574337bfc2ed9c1e7a7f844fa2
SHA1b5ca54ecae35b3e241fd07ee6055394e20043c13
SHA25695332d921556a7709512c2a8f8c8dfec0d77c3b23eea611ec6da04c072544cc5
SHA512f8615d63fbbe26f13446f6cc8c96e4d41e0822048889ad30a7560caaecf6bab236b221948f60539bc3c5f15789fede52d66dab1e40a3f4510ff033950d9e330b
-
C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\Opera_new.pngFilesize
38KB
MD5d9ee988b72b14e305f2b8891b1952cde
SHA1fe73c83b75b11b6eec464cd68df6748ad446ff47
SHA2562fe0e0d53b94b1dfecb7a9a1990479d55371c49d8387e9037a48460c4b2d76fe
SHA5129f31c3470a598350296879d6a7d8ccff96d64b59dafb00e53b8ae90f78b341bf7cbde1a4d0fe836e6013048910ee9aa54baece3b6d754c5c0c1e0cd52ccf6eaa
-
C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\RAV_Cross.pngFilesize
56KB
MD54167c79312b27c8002cbeea023fe8cb5
SHA1fda8a34c9eba906993a336d01557801a68ac6681
SHA256c3bf350627b842bed55e6a72ab53da15719b4f33c267a6a132cb99ff6afe3cd8
SHA5124815746e5e30cbef626228601f957d993752a3d45130feeda335690b7d21ed3d6d6a6dc0ad68a1d5ba584b05791053a4fc7e9ac7b64abd47feaa8d3b919353bb
-
C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component0.exeFilesize
44KB
MD514289d75280a89979ca3e0e90081ef35
SHA14d2ca18611cf967d50d850fc68080cb36528df43
SHA256b95dd3698f06f86f4c32bd0647b257468edca0d0e76c6e253113ac9eb3a67264
SHA512b3205d926a4c93d5a032fae1df7a1cf932551ee579874e79599c4796d11e79e6bcb0f33b662ff11e1a264b90d8945e11c1eede67ba99465c91e340dd44b4c567
-
C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component1.zipFilesize
2.3MB
MD5f743314bda8fb2a98ae14316c4d0d3a2
SHA15d8f007bd38a0b20d5c5ed5aa20b77623a856297
SHA2562113c6d5ef32e3ded8b4b070a6d0da8b1c11a1ba5e7d7fbfb61deeeafc9d451c
SHA512f30af84df2eb2ddf3ed414c069f0edbcf42110f14e0aed61c0f28d6bca0f1c7785db1d53f90686ffe1f543d610b0f5f223c79160f7245924c38d99e6ffe2321d
-
C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\component1_extract\OperaSetup.exeFilesize
5.1MB
MD5472dea5069dd8ba24cd0379d70a78f4f
SHA1b543293dd4cf909eb0ad3477e718bcdcbf0dadef
SHA25680640139d8a69161417b01b1e21618921096ec5ea25658e1a56de9a6b7941395
SHA512fa85babaa4a7ac60759da659ef22348569cf7c653d6c865b3c8277dc1a4a9d7edb356a621b218a9c1f39b48ac7f01dee902a046a57b2bc8b9ce6f424051bf6e4
-
C:\Users\Admin\AppData\Local\Temp\is-PPNSI.tmp\mainlogo.pngFilesize
3KB
MD56613711e0275a30ae0ebb2cf15ea2cd5
SHA1aca1ca94ccd1545bb7c45196fb0263d3e663b392
SHA256e27ed5122766a4961f0f8441767e21e3237fa52e68086cde03cd97e871762163
SHA512617d6b66387ae5d2b9563f8b45c40cce90ca5c1f6a8038dbdca2622c7c1b23d46f2877b3b44e442b33d1d0336c18a5344581c03f1718acbfa4e8e6c1802430bf
-
C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\Microsoft.Win32.TaskScheduler.dllFilesize
341KB
MD5a09decc59b2c2f715563bb035ee4241e
SHA1c84f5e2e0f71feef437cf173afeb13fe525a0fea
SHA2566b8f51508240af3b07a8d0b2dc873cedc3d5d9cb25e57ea1d55626742d1f9149
SHA5121992c8e1f7e37a58bbf486f76d1320da8e1757d6296c8a7631f35ba2e376de215c65000612364c91508aa3ddf72841f6b823fa60a2b29415a07c74c2e830212b
-
C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\RAVEndPointProtection-installer.exeFilesize
539KB
MD541a3c2a1777527a41ddd747072ee3efd
SHA144b70207d0883ec1848c3c65c57d8c14fd70e2c3
SHA2568592bae7b6806e5b30a80892004a7b79f645a16c0f1b85b4b8df809bdb6cf365
SHA51214df28cc7769cf78b24ab331bd63da896131a2f0fbb29b10199016aef935d376493e937874eb94faf52b06a98e1678a5cf2c2d0d442c31297a9c0996205ed869
-
C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\rsAtom.dllFilesize
156KB
MD59deba7281d8eceefd760874434bd4e91
SHA1553e6c86efdda04beacee98bcee48a0b0dba6e75
SHA25602a42d2403f0a61c3a52138c407b41883fa27d9128ecc885cf1d35e4edd6d6b9
SHA5127a82fbac4ade3a9a29cb877cc716bc8f51b821b533f31f5e0979f0e9aca365b0353e93cc5352a21fbd29df8fc0f9a2025351453032942d580b532ab16acaa306
-
C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\rsJSON.dllFilesize
218KB
MD5f8978087767d0006680c2ec43bda6f34
SHA1755f1357795cb833f0f271c7c87109e719aa4f32
SHA256221bb12d3f9b2aa40ee21d2d141a8d12e893a8eabc97a04d159aa46aecfa5d3e
SHA51254f48c6f94659c88d947a366691fbaef3258ed9d63858e64ae007c6f8782f90ede5c9ab423328062c746bc4ba1e8d30887c97015a5e3e52a432a9caa02bb6955
-
C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\rsLogger.dllFilesize
177KB
MD583ad54079827e94479963ba4465a85d7
SHA1d33efd0f5e59d1ef30c59d74772b4c43162dc6b7
SHA256ec0a8c14a12fdf8d637408f55e6346da1c64efdd00cc8921f423b1a2c63d3312
SHA512c294fb8ac2a90c6125f8674ca06593b73b884523737692af3ccaa920851fc283a43c9e2dc928884f97b08fc8974919ec603d1afb5c178acd0c2ebd6746a737e1
-
C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\rsStubLib.dllFilesize
248KB
MD5a16602aad0a611d228af718448ed7cbd
SHA1ddd9b80306860ae0b126d3e834828091c3720ac5
SHA256a1f4ba5bb347045d36dcaac3a917236b924c0341c7278f261109bf137dcef95a
SHA512305a3790a231b4c93b8b4e189e18cb6a06d20b424fd6237d32183c91e2a5c1e863096f4d1b30b73ff15c4c60af269c4faaadaf42687101b1b219795abc70f511
-
C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\tmp\RAVEndPointProtection-installer.exe\assembly\dl3\586a467b\3eb28c58_1c8fda01\rsLogger.DLLFilesize
179KB
MD5b279550f2557481ae48e257f0964ae29
SHA153bef04258321ca30a6d36a7d3523032e3087a3e
SHA25613fe4a20114cdf8cd3bba42eeaabe8d49be0b03eec423f530c890463014ccaaa
SHA512f603cbac1f55ad4de7a561a1d9c27e33e36de00f09a18ff956456afec958f3e777277db74f0b25c6467e765d39175aa4fcdd38e87a3d666b608d983acb9321cd
-
C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\tmp\RAVEndPointProtection-installer.exe\assembly\dl3\af42aa25\3eb28c58_1c8fda01\rsServiceController.DLLFilesize
174KB
MD5d0779008ba2dc5aba2393f95435a6e8d
SHA114ccd0d7b6128cf11c58f15918b2598c5fefe503
SHA256e74a387b85ee4346b983630b571d241749224d51b81b607f88f6f77559f9cb05
SHA512931edd82977e9a58c6669287b38c1b782736574db88dad0cc6e0d722c6e810822b3cbe5689647a8a6f2b3692d0c348eb063e17abfa5580a66b17552c30176426
-
C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\tmp\RAVEndPointProtection-installer.exe\assembly\dl3\eb4b50b0\46ed8758_1c8fda01\rsAtom.DLLFilesize
158KB
MD5875e26eb233dbf556ddb71f1c4d89bb6
SHA162b5816d65db3de8b8b253a37412c02e9f46b0f9
SHA256e62ac7163d7d48504992cd284630c8f94115c3718d60340ad9bb7ee5dd115b35
SHA51254fdc659157667df4272ac11048f239101cb12b39b2bf049ef552b4e0ce3998ff627bf763e75b5c69cc0d4ef116bfe9043c9a22f2d923dbedddacf397e621035
-
C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\tmp\RAVEndPointProtection-installer.exe\assembly\tmp\C15KKNID\rsJSON.DLLFilesize
219KB
MD5d43100225a3f78936ca012047a215559
SHA1c68013c5f929fe098a57870553c3204fd9617904
SHA256cc5ea6c9c8a14c48a20715b6b3631cbf42f73b41b87d1fbb0462738ff80dc01a
SHA5129633992a07ea61a9d7acd0723dbd715dbd384e01e268131df0534bcdfcd92f12e3decc76aa870ea4786314c0b939b41c5f9e591a18c4d9d0bad069f30acd833e
-
C:\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\uninstall.icoFilesize
170KB
MD5af1c23b1e641e56b3de26f5f643eb7d9
SHA16c23deb9b7b0c930533fdbeea0863173d99cf323
SHA2560d3a05e1b06403f2130a6e827b1982d2af0495cdd42deb180ca0ce4f20db5058
SHA5120c503ec7e83a5bfd59ec8ccc80f6c54412263afd24835b8b4272a79c440a0c106875b5c3b9a521a937f0615eb4f112d1d6826948ad5fb6fd173c5c51cb7168f4
-
C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.datFilesize
40B
MD515adc867c47382c18ecb9fb24834d841
SHA1bf9233eaff089c3459683821e5fce0e467f3b3fe
SHA2565608f87a4bcb845bf9359b311ec23053cacc708d29022ef769c42a1b8bf6dfdc
SHA512f36d0b6e71666ec30a54fb64c9be47257f98f29b3b30891a5050d3dabe48cef71210044b1253adb804af52a5af2bb9eab04fa83267f9b37d37ea48a8ac205113
-
C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP\Partitions\plan-picker_5.28.2\Cache\Cache_Data\data_0Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP\Partitions\plan-picker_5.28.2\Cache\Cache_Data\data_1Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP\Partitions\plan-picker_5.28.2\Cache\Cache_Data\data_2Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP\Partitions\plan-picker_5.28.2\Cache\Cache_Data\data_3Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
C:\Users\Admin\AppData\Roaming\ReasonLabs\EPP\Partitions\plan-picker_5.28.2\Local Storage\leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\Downloads\uconeer-units-conversion-for-engineers-3.4-installer.exeFilesize
1.9MB
MD5a76e8ba0ea3ec64953bac23b287e4c0b
SHA1fab26482564a690d5489ee1b8f6bd7fd4d62f81c
SHA2568b5ab9174204a2c588573482d4c10711a4042497307cd053039057d2ddbdfb8c
SHA5129a4010772b05cd55580e0a7c5fd5c54a135a6cd96f0e0cadaa05f67a2d851330c78981826ce26cb262605f40acddeb4e1642664958870978a3ae0dd5fe7209b7
-
C:\Users\Admin\Downloads\uconeer-units-conversion-for-engineers-3.4-installer_v-bflK1.exeFilesize
1.7MB
MD5d95fcbfcad9e6f4a360231e4d5f65145
SHA15805d2b22cf4076d9623972087ba9c13be3d9009
SHA25635e63cfcf5dea8d660b0c079ab5595a63b9b2b54fe30fa028f16f7c1a97b356f
SHA51200bbe867f73ad6612486cfb6e280b7ff31c7c3d1bc4f9e812969d330b52b89e6de4fa099c5c195e52a59c63aa1d242eb61c9e23d5b8d685cfa82414f56b9da7c
-
\??\pipe\crashpad_2544_NGXRLMCTPQQKVPWMMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\Temp\Opera_installer_2404151004293893116.dllFilesize
4.6MB
MD52a3159d6fef1100348d64bf9c72d15ee
SHA152a08f06f6baaa12163b92f3c6509e6f1e003130
SHA256668bf8a7f3e53953dd6789fc6146a205c6c7330832c5d20b439eedb7c52ed303
SHA512251c0d3cdd0597b962d4e32cf588a82454c42067cbe5e35b41b0548eea742ea25815e5d6830b63c1992b5730a4e6d7c005fb0019aa4c389549b06fff9a74b38c
-
\Users\Admin\AppData\Local\Temp\nsd4E0D.tmp\ArchiveUtilityx64.dllFilesize
150KB
MD53351152f6ee87e97682a0a7c459ef614
SHA15312f9da67fcfd573dc5e45f6a7cc35fa463af89
SHA2566e2673687ba029074657f0d1c4410691ee013eff2223d0c7695dfe4f70c62f1c
SHA5122b7ecb22746bf907ae4da891e170226da4f180ade27e41a16e1ef9e11f39e5e35b9eac3fcfff520dbb8a8888a1dbd1ca2459ab58ce8dc44a424c5de7b8132de6
-
\Users\Admin\AppData\Local\Temp\nso4DFD.tmp\System.dllFilesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
memory/992-104-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/992-65-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/992-62-0x0000000000400000-0x00000000004D8000-memory.dmpFilesize
864KB
-
memory/2316-1346-0x000002B305DE0000-0x000002B305DE1000-memory.dmpFilesize
4KB
-
memory/2316-1343-0x000002B305DD0000-0x000002B305DD1000-memory.dmpFilesize
4KB
-
memory/2316-1345-0x000002B305E10000-0x000002B305E36000-memory.dmpFilesize
152KB
-
memory/2316-1342-0x000002B31FE50000-0x000002B31FEA4000-memory.dmpFilesize
336KB
-
memory/2316-1337-0x000002B3059A0000-0x000002B3059F4000-memory.dmpFilesize
336KB
-
memory/2316-1340-0x000002B305D80000-0x000002B305D81000-memory.dmpFilesize
4KB
-
memory/2316-1339-0x000002B31FE40000-0x000002B31FE50000-memory.dmpFilesize
64KB
-
memory/2316-1338-0x00007FFE6A530000-0x00007FFE6AF1C000-memory.dmpFilesize
9.9MB
-
memory/2656-1322-0x000002B222F70000-0x000002B2232D4000-memory.dmpFilesize
3.4MB
-
memory/2656-1321-0x000002B222A40000-0x000002B222F6A000-memory.dmpFilesize
5.2MB
-
memory/2656-1320-0x00007FFE6A530000-0x00007FFE6AF1C000-memory.dmpFilesize
9.9MB
-
memory/2656-1323-0x000002B222620000-0x000002B222630000-memory.dmpFilesize
64KB
-
memory/2656-1324-0x000002B2097A0000-0x000002B2097A1000-memory.dmpFilesize
4KB
-
memory/2656-1325-0x000002B2227B0000-0x000002B22292A000-memory.dmpFilesize
1.5MB
-
memory/2656-1326-0x000002B209BA0000-0x000002B209BBA000-memory.dmpFilesize
104KB
-
memory/2656-1327-0x000002B209BF0000-0x000002B209C12000-memory.dmpFilesize
136KB
-
memory/3064-460-0x00007FFE6A530000-0x00007FFE6AF1C000-memory.dmpFilesize
9.9MB
-
memory/3064-1200-0x000001ED1DDD0000-0x000001ED1DDE0000-memory.dmpFilesize
64KB
-
memory/3064-146-0x000001ED1DDD0000-0x000001ED1DDE0000-memory.dmpFilesize
64KB
-
memory/3064-145-0x00007FFE6A530000-0x00007FFE6AF1C000-memory.dmpFilesize
9.9MB
-
memory/3064-144-0x000001ED38370000-0x000001ED38896000-memory.dmpFilesize
5.1MB
-
memory/3064-143-0x000001ED1D9C0000-0x000001ED1D9C8000-memory.dmpFilesize
32KB
-
memory/3432-741-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-298-0x000001609C560000-0x000001609C561000-memory.dmpFilesize
4KB
-
memory/3432-747-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-739-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-737-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-735-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-731-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-729-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-727-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-725-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-751-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-1203-0x00000160B6D60000-0x00000160B6D9A000-memory.dmpFilesize
232KB
-
memory/3432-1201-0x00000160B6890000-0x00000160B6891000-memory.dmpFilesize
4KB
-
memory/3432-763-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-1212-0x00007FFE6A530000-0x00007FFE6AF1C000-memory.dmpFilesize
9.9MB
-
memory/3432-1214-0x00000160B68C0000-0x00000160B68C1000-memory.dmpFilesize
4KB
-
memory/3432-1216-0x00000160B6D20000-0x00000160B6D50000-memory.dmpFilesize
192KB
-
memory/3432-753-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-1222-0x000001609C510000-0x000001609C520000-memory.dmpFilesize
64KB
-
memory/3432-1223-0x00000160B68A0000-0x00000160B68A1000-memory.dmpFilesize
4KB
-
memory/3432-1228-0x00000160B6D20000-0x00000160B6D4A000-memory.dmpFilesize
168KB
-
memory/3432-755-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-1234-0x00000160B68B0000-0x00000160B68B1000-memory.dmpFilesize
4KB
-
memory/3432-1236-0x000001609C510000-0x000001609C520000-memory.dmpFilesize
64KB
-
memory/3432-757-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-761-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-1241-0x00000160B6E50000-0x00000160B6E7E000-memory.dmpFilesize
184KB
-
memory/3432-1247-0x00000160B6910000-0x00000160B6911000-memory.dmpFilesize
4KB
-
memory/3432-759-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-743-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-745-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-283-0x000001609C110000-0x000001609C198000-memory.dmpFilesize
544KB
-
memory/3432-287-0x000001609C590000-0x000001609C5D0000-memory.dmpFilesize
256KB
-
memory/3432-288-0x00007FFE6A530000-0x00007FFE6AF1C000-memory.dmpFilesize
9.9MB
-
memory/3432-290-0x000001609C5D0000-0x000001609C600000-memory.dmpFilesize
192KB
-
memory/3432-297-0x000001609C510000-0x000001609C520000-memory.dmpFilesize
64KB
-
memory/3432-733-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-749-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-300-0x000001609DFC0000-0x000001609DFFA000-memory.dmpFilesize
232KB
-
memory/3432-714-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-301-0x000001609C520000-0x000001609C521000-memory.dmpFilesize
4KB
-
memory/3432-715-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-723-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-717-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-721-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-719-0x00000160B6CD0000-0x00000160B6D1E000-memory.dmpFilesize
312KB
-
memory/3432-713-0x00000160B6CD0000-0x00000160B6D20000-memory.dmpFilesize
320KB
-
memory/3432-307-0x000001609DF80000-0x000001609DFAA000-memory.dmpFilesize
168KB
-
memory/3432-308-0x000001609C530000-0x000001609C531000-memory.dmpFilesize
4KB
-
memory/3432-316-0x00000160B6940000-0x00000160B6998000-memory.dmpFilesize
352KB
-
memory/4464-121-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/4464-110-0x00000000049F0000-0x0000000004B30000-memory.dmpFilesize
1.2MB
-
memory/4464-284-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/4464-69-0x0000000000950000-0x0000000000951000-memory.dmpFilesize
4KB
-
memory/4464-203-0x00000000049F0000-0x0000000004B30000-memory.dmpFilesize
1.2MB
-
memory/4464-93-0x00000000049F0000-0x0000000004B30000-memory.dmpFilesize
1.2MB
-
memory/4464-94-0x00000000049F0000-0x0000000004B30000-memory.dmpFilesize
1.2MB
-
memory/4464-128-0x00000000049F0000-0x0000000004B30000-memory.dmpFilesize
1.2MB
-
memory/4464-105-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/4464-109-0x00000000049F0000-0x0000000004B30000-memory.dmpFilesize
1.2MB
-
memory/4464-285-0x00000000049F0000-0x0000000004B30000-memory.dmpFilesize
1.2MB
-
memory/4464-347-0x00000000049F0000-0x0000000004B30000-memory.dmpFilesize
1.2MB
-
memory/4464-442-0x0000000000400000-0x000000000071C000-memory.dmpFilesize
3.1MB
-
memory/4464-348-0x00000000049F0000-0x0000000004B30000-memory.dmpFilesize
1.2MB
-
memory/4464-122-0x0000000000950000-0x0000000000951000-memory.dmpFilesize
4KB
-
memory/4464-127-0x00000000049F0000-0x0000000004B30000-memory.dmpFilesize
1.2MB
-
memory/4464-126-0x00000000049F0000-0x0000000004B30000-memory.dmpFilesize
1.2MB
-
memory/5008-1282-0x00000205C22B0000-0x00000205C22B1000-memory.dmpFilesize
4KB
-
memory/5008-1297-0x00000205DC330000-0x00000205DC36E000-memory.dmpFilesize
248KB
-
memory/5008-1278-0x00000205C1EF0000-0x00000205C1F1E000-memory.dmpFilesize
184KB
-
memory/5008-1279-0x00007FFE6A530000-0x00007FFE6AF1C000-memory.dmpFilesize
9.9MB
-
memory/5008-1281-0x00000205DC320000-0x00000205DC330000-memory.dmpFilesize
64KB
-
memory/5008-1283-0x00000205C1EF0000-0x00000205C1F1E000-memory.dmpFilesize
184KB
-
memory/5008-1296-0x00000205C3BC0000-0x00000205C3BD2000-memory.dmpFilesize
72KB
-
memory/5008-1317-0x00007FFE6A530000-0x00007FFE6AF1C000-memory.dmpFilesize
9.9MB