Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2023 12:46
Behavioral task
behavioral1
Sample
addc42e69559f307ae39cc92d158cb4e378ca1400d5d4b929ccd379cfd6547b5.exe
Resource
win10v2004-20221111-en
General
-
Target
addc42e69559f307ae39cc92d158cb4e378ca1400d5d4b929ccd379cfd6547b5.exe
-
Size
1.3MB
-
MD5
97de4daed939b69a10f6428de4f67f50
-
SHA1
5da5c0d5d034703209f0d6aff2d4230528d89b4c
-
SHA256
addc42e69559f307ae39cc92d158cb4e378ca1400d5d4b929ccd379cfd6547b5
-
SHA512
66a8f712048daf17a01c5994e321e752cbd7da8b30f639a32b196c8d801f0ca8d9f2a1f123ce78d608359baf37cc857b3bbc9826885d3f32ff3e0a432b2df34a
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 57 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1312 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 780 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1340 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5036 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 960 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1032 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2800 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4644 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2680 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2932 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 564 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4260 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3548 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 228 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 220 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4208 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 756 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3236 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3776 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 448 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2980 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3820 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 824 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 880 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4248 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2152 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4276 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1964 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4244 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2136 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 700 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2672 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2116 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2440 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1144 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4692 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1744 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3164 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3968 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1892 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1560 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4584 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1664 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4140 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 956 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3044 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2292 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4128 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3900 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3596 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3684 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4752 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 540 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3328 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2520 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4332 3028 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3744 3028 schtasks.exe -
Processes:
resource yara_rule C:\providercommon\DllCommonsvc.exe dcrat C:\providercommon\DllCommonsvc.exe dcrat behavioral1/memory/3488-139-0x00000000000B0000-0x00000000001C0000-memory.dmp dcrat C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe dcrat C:\ProgramData\SoftwareDistribution\fontdrvhost.exe dcrat C:\ProgramData\SoftwareDistribution\fontdrvhost.exe dcrat C:\ProgramData\SoftwareDistribution\fontdrvhost.exe dcrat C:\ProgramData\SoftwareDistribution\fontdrvhost.exe dcrat C:\ProgramData\SoftwareDistribution\fontdrvhost.exe dcrat C:\ProgramData\SoftwareDistribution\fontdrvhost.exe dcrat C:\ProgramData\SoftwareDistribution\fontdrvhost.exe dcrat C:\ProgramData\SoftwareDistribution\fontdrvhost.exe dcrat C:\ProgramData\SoftwareDistribution\fontdrvhost.exe dcrat C:\ProgramData\SoftwareDistribution\fontdrvhost.exe dcrat C:\ProgramData\SoftwareDistribution\fontdrvhost.exe dcrat -
Executes dropped EXE 12 IoCs
Processes:
DllCommonsvc.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exepid process 3488 DllCommonsvc.exe 3328 fontdrvhost.exe 5272 fontdrvhost.exe 2844 fontdrvhost.exe 1556 fontdrvhost.exe 5624 fontdrvhost.exe 3548 fontdrvhost.exe 932 fontdrvhost.exe 5768 fontdrvhost.exe 5796 fontdrvhost.exe 4480 fontdrvhost.exe 4588 fontdrvhost.exe -
Checks computer location settings 2 TTPs 14 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
fontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exeaddc42e69559f307ae39cc92d158cb4e378ca1400d5d4b929ccd379cfd6547b5.exeDllCommonsvc.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation addc42e69559f307ae39cc92d158cb4e378ca1400d5d4b929ccd379cfd6547b5.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation DllCommonsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation fontdrvhost.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation WScript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 18 IoCs
Processes:
DllCommonsvc.exedescription ioc process File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\wininit.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\56085415360792 DllCommonsvc.exe File created C:\Program Files\7-Zip\Lang\6203df4a6bafc7 DllCommonsvc.exe File created C:\Program Files\Mozilla Firefox\browser\VisualElements\9e8d7a4ca61bd9 DllCommonsvc.exe File created C:\Program Files (x86)\Windows Mail\smss.exe DllCommonsvc.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\WmiPrvSE.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Mail\69ddcba757bf72 DllCommonsvc.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\SearchApp.exe DllCommonsvc.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\38384e6a620884 DllCommonsvc.exe File created C:\Program Files (x86)\Windows Multimedia Platform\wininit.exe DllCommonsvc.exe File created C:\Program Files (x86)\Windows Multimedia Platform\56085415360792 DllCommonsvc.exe File created C:\Program Files\7-Zip\Lang\lsass.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft\Temp\Registry.exe DllCommonsvc.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\csrss.exe DllCommonsvc.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\886983d96e3d3e DllCommonsvc.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\24dbde2999530e DllCommonsvc.exe File created C:\Program Files\Mozilla Firefox\browser\VisualElements\RuntimeBroker.exe DllCommonsvc.exe File created C:\Program Files (x86)\Microsoft\Temp\ee2ad38f3d4382 DllCommonsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
DllCommonsvc.exedescription ioc process File created C:\Windows\Boot\winlogon.exe DllCommonsvc.exe File created C:\Windows\rescache\_merged\4245263321\wininit.exe DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 57 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2800 schtasks.exe 3236 schtasks.exe 2152 schtasks.exe 1964 schtasks.exe 448 schtasks.exe 2980 schtasks.exe 2292 schtasks.exe 4260 schtasks.exe 3684 schtasks.exe 2932 schtasks.exe 4208 schtasks.exe 3820 schtasks.exe 1744 schtasks.exe 3044 schtasks.exe 4752 schtasks.exe 3328 schtasks.exe 1340 schtasks.exe 3548 schtasks.exe 3164 schtasks.exe 2680 schtasks.exe 2136 schtasks.exe 2116 schtasks.exe 4584 schtasks.exe 756 schtasks.exe 880 schtasks.exe 956 schtasks.exe 3596 schtasks.exe 2520 schtasks.exe 1144 schtasks.exe 1892 schtasks.exe 4332 schtasks.exe 2440 schtasks.exe 1560 schtasks.exe 5036 schtasks.exe 228 schtasks.exe 824 schtasks.exe 780 schtasks.exe 960 schtasks.exe 4644 schtasks.exe 3776 schtasks.exe 1664 schtasks.exe 3744 schtasks.exe 1312 schtasks.exe 4248 schtasks.exe 4276 schtasks.exe 2672 schtasks.exe 4692 schtasks.exe 3968 schtasks.exe 3900 schtasks.exe 1032 schtasks.exe 564 schtasks.exe 220 schtasks.exe 700 schtasks.exe 4244 schtasks.exe 4128 schtasks.exe 540 schtasks.exe 4140 schtasks.exe -
Modifies registry class 12 IoCs
Processes:
fontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exeaddc42e69559f307ae39cc92d158cb4e378ca1400d5d4b929ccd379cfd6547b5.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings addc42e69559f307ae39cc92d158cb4e378ca1400d5d4b929ccd379cfd6547b5.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings fontdrvhost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
DllCommonsvc.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3488 DllCommonsvc.exe 3508 powershell.exe 1004 powershell.exe 1004 powershell.exe 1556 powershell.exe 1556 powershell.exe 1324 powershell.exe 1324 powershell.exe 536 powershell.exe 536 powershell.exe 2128 powershell.exe 2128 powershell.exe 932 powershell.exe 932 powershell.exe 4648 powershell.exe 4648 powershell.exe 4972 powershell.exe 4972 powershell.exe 1816 powershell.exe 1816 powershell.exe 2144 powershell.exe 2144 powershell.exe 4048 powershell.exe 4048 powershell.exe 5076 powershell.exe 5076 powershell.exe 5048 powershell.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
Processes:
DllCommonsvc.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exefontdrvhost.exedescription pid process Token: SeDebugPrivilege 3488 DllCommonsvc.exe Token: SeDebugPrivilege 3508 powershell.exe Token: SeDebugPrivilege 1004 powershell.exe Token: SeDebugPrivilege 1556 powershell.exe Token: SeDebugPrivilege 1324 powershell.exe Token: SeDebugPrivilege 536 powershell.exe Token: SeDebugPrivilege 2128 powershell.exe Token: SeDebugPrivilege 932 powershell.exe Token: SeDebugPrivilege 4648 powershell.exe Token: SeDebugPrivilege 4972 powershell.exe Token: SeDebugPrivilege 1816 powershell.exe Token: SeDebugPrivilege 2144 powershell.exe Token: SeDebugPrivilege 4048 powershell.exe Token: SeDebugPrivilege 5076 powershell.exe Token: SeDebugPrivilege 5048 powershell.exe Token: SeDebugPrivilege 216 powershell.exe Token: SeDebugPrivilege 2500 powershell.exe Token: SeDebugPrivilege 3104 powershell.exe Token: SeDebugPrivilege 872 powershell.exe Token: SeDebugPrivilege 1804 powershell.exe Token: SeDebugPrivilege 3904 powershell.exe Token: SeDebugPrivilege 3328 fontdrvhost.exe Token: SeDebugPrivilege 5272 fontdrvhost.exe Token: SeDebugPrivilege 2844 fontdrvhost.exe Token: SeDebugPrivilege 1556 fontdrvhost.exe Token: SeDebugPrivilege 5624 fontdrvhost.exe Token: SeDebugPrivilege 3548 fontdrvhost.exe Token: SeDebugPrivilege 932 fontdrvhost.exe Token: SeDebugPrivilege 5768 fontdrvhost.exe Token: SeDebugPrivilege 5796 fontdrvhost.exe Token: SeDebugPrivilege 4480 fontdrvhost.exe Token: SeDebugPrivilege 4588 fontdrvhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
addc42e69559f307ae39cc92d158cb4e378ca1400d5d4b929ccd379cfd6547b5.exeWScript.execmd.exeDllCommonsvc.exefontdrvhost.execmd.exefontdrvhost.execmd.exefontdrvhost.exedescription pid process target process PID 1816 wrote to memory of 4972 1816 addc42e69559f307ae39cc92d158cb4e378ca1400d5d4b929ccd379cfd6547b5.exe WScript.exe PID 1816 wrote to memory of 4972 1816 addc42e69559f307ae39cc92d158cb4e378ca1400d5d4b929ccd379cfd6547b5.exe WScript.exe PID 1816 wrote to memory of 4972 1816 addc42e69559f307ae39cc92d158cb4e378ca1400d5d4b929ccd379cfd6547b5.exe WScript.exe PID 4972 wrote to memory of 4448 4972 WScript.exe cmd.exe PID 4972 wrote to memory of 4448 4972 WScript.exe cmd.exe PID 4972 wrote to memory of 4448 4972 WScript.exe cmd.exe PID 4448 wrote to memory of 3488 4448 cmd.exe DllCommonsvc.exe PID 4448 wrote to memory of 3488 4448 cmd.exe DllCommonsvc.exe PID 3488 wrote to memory of 3508 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 3508 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 536 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 536 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 1556 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 1556 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 1324 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 1324 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 2128 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 2128 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 1004 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 1004 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 932 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 932 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 4648 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 4648 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 1816 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 1816 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 4972 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 4972 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 4048 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 4048 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 2144 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 2144 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 5048 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 5048 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 5076 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 5076 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 216 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 216 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 2500 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 2500 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 872 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 872 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 3104 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 3104 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 1804 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 1804 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 3904 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 3904 3488 DllCommonsvc.exe powershell.exe PID 3488 wrote to memory of 3328 3488 DllCommonsvc.exe fontdrvhost.exe PID 3488 wrote to memory of 3328 3488 DllCommonsvc.exe fontdrvhost.exe PID 3328 wrote to memory of 5988 3328 fontdrvhost.exe cmd.exe PID 3328 wrote to memory of 5988 3328 fontdrvhost.exe cmd.exe PID 5988 wrote to memory of 6108 5988 cmd.exe w32tm.exe PID 5988 wrote to memory of 6108 5988 cmd.exe w32tm.exe PID 5988 wrote to memory of 5272 5988 cmd.exe fontdrvhost.exe PID 5988 wrote to memory of 5272 5988 cmd.exe fontdrvhost.exe PID 5272 wrote to memory of 5604 5272 fontdrvhost.exe cmd.exe PID 5272 wrote to memory of 5604 5272 fontdrvhost.exe cmd.exe PID 5604 wrote to memory of 3628 5604 cmd.exe w32tm.exe PID 5604 wrote to memory of 3628 5604 cmd.exe w32tm.exe PID 5604 wrote to memory of 2844 5604 cmd.exe fontdrvhost.exe PID 5604 wrote to memory of 2844 5604 cmd.exe fontdrvhost.exe PID 2844 wrote to memory of 5220 2844 fontdrvhost.exe cmd.exe PID 2844 wrote to memory of 5220 2844 fontdrvhost.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\addc42e69559f307ae39cc92d158cb4e378ca1400d5d4b929ccd379cfd6547b5.exe"C:\Users\Admin\AppData\Local\Temp\addc42e69559f307ae39cc92d158cb4e378ca1400d5d4b929ccd379cfd6547b5.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\upfc.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Multimedia Platform\wininit.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Local Settings\spoolsv.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\7-Zip\Lang\lsass.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\WmiPrvSE.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Mozilla Firefox\browser\VisualElements\RuntimeBroker.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Desktop\smss.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Mail\smss.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft\Temp\Registry.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\csrss.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\wininit.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\winlogon.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Mozilla Maintenance Service\logs\SearchApp.exe'5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\cmd.exe'5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\conhost.exe'5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\jClCs9nEU3.bat"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵
-
C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"7⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NczlPfxoCy.bat"8⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:29⤵
-
C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"9⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\410ZzJtAuR.bat"10⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:211⤵
-
C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"11⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\hGj9C4kLBH.bat"12⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:213⤵
-
C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"13⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cOf3pucYXi.bat"14⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:215⤵
-
C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"15⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Zcl4dB2r8y.bat"16⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:217⤵
-
C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"17⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Kq4mDwN7mD.bat"18⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:219⤵
-
C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"19⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\RdAvGBYmjZ.bat"20⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:221⤵
-
C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"21⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\rBMLF9HJtT.bat"22⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:223⤵
-
C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"23⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\nAABNdhKLs.bat"24⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:225⤵
-
C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe"25⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\LgxiiauvsB.bat"26⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:227⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\SendTo\sihost.exe'5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\wininit.exe'5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\SppExtComObj.exe'5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "upfcu" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Local Settings\spoolsv.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Users\Admin\Local Settings\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Local Settings\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\SoftwareDistribution\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Program Files\7-Zip\Lang\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 8 /tr "'C:\Program Files\7-Zip\Lang\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Program Files\Mozilla Firefox\browser\VisualElements\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\browser\VisualElements\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Program Files\Mozilla Firefox\browser\VisualElements\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Users\Public\Desktop\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Public\Desktop\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Desktop\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Mail\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Windows Mail\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\Microsoft\Temp\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft\Temp\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft\Temp\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Mozilla Maintenance Service\logs\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\providercommon\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\providercommon\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 10 /tr "'C:\providercommon\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 9 /tr "'C:\providercommon\SppExtComObj.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\providercommon\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 11 /tr "'C:\providercommon\SppExtComObj.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 7 /tr "'C:\odt\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\odt\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\odt\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Users\Default\SendTo\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Users\Default\SendTo\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Users\Default\SendTo\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 7 /tr "'C:\odt\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\odt\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\odt\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\SoftwareDistribution\fontdrvhost.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\ProgramData\SoftwareDistribution\fontdrvhost.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\ProgramData\SoftwareDistribution\fontdrvhost.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\ProgramData\SoftwareDistribution\fontdrvhost.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\ProgramData\SoftwareDistribution\fontdrvhost.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\ProgramData\SoftwareDistribution\fontdrvhost.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\ProgramData\SoftwareDistribution\fontdrvhost.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\ProgramData\SoftwareDistribution\fontdrvhost.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\ProgramData\SoftwareDistribution\fontdrvhost.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\ProgramData\SoftwareDistribution\fontdrvhost.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\ProgramData\SoftwareDistribution\fontdrvhost.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\fontdrvhost.exe.logFilesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5e243a38635ff9a06c87c2a61a2200656
SHA1ecd95ed5bf1a9fbe96a8448fc2814a0210fa2afc
SHA256af5782703f3f2d5a29fb313dae6680a64134db26064d4a321a3f23b75f6ca00f
SHA5124418957a1b10eee44cf270c81816ae707352411c4f5ac14b6b61ab537c91480e24e0a0a2c276a6291081b4984c123cf673a45dcedb0ceeef682054ba0fc19cb4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5a8e8360d573a4ff072dcc6f09d992c88
SHA13446774433ceaf0b400073914facab11b98b6807
SHA256bf5e284e8f95122bf75ead61c7e2b40f55c96742b05330b5b1cb7915991df13b
SHA5124ee5167643d82082f57c42616007ef9be57f43f9731921bdf7bca611a914724ad94072d3c8f5b130fa54129e5328ccdebf37ba74339c37deb53e79df5cdf0dbe
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD561e06aa7c42c7b2a752516bcbb242cc1
SHA102c54f8b171ef48cad21819c20b360448418a068
SHA2565bb0254e8f0220caab64dcc785f432820350471bfcdcb98240c3e0e71a709f5d
SHA51203731f49999ec895370100a4dfeee674bbe5baa50d82007256e6914c323412eef8936b320d2738774758fbbfd76d4c3d391d9e144e65587eba700d98d0362346
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD560804e808a88131a5452fed692914a8e
SHA1fdb74669923b31d573787fe024dbd701fa21bb5b
SHA256064fdd6e9e6e7f51da354604a56f66217f1edfc12d9bbbaf869a628915a86a61
SHA512d4f2791433c0bacd8cad57b40fab4a807db4dd74f7c5357d2bce9aaa6544f97667497307d1e0704b98e2c99a94775fbb6ea676685a01578e4d0304f541c9854a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD517fbfbe3f04595e251287a6bfcdc35de
SHA1b576aabfd5e6d5799d487011506ed1ae70688987
SHA2562e61ae727ca01496c9418a65777d6d7e05a85cbdb6b3a19516857442e5bd2da0
SHA512449c68512d90a17f598e9dacfd6230e6e97bc6bfaaf2b06f3b91b370ece92e2322b81ee3721e288880fa1f05470156e519256e3f03d786c3b28a39788f5e0ad6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD517fbfbe3f04595e251287a6bfcdc35de
SHA1b576aabfd5e6d5799d487011506ed1ae70688987
SHA2562e61ae727ca01496c9418a65777d6d7e05a85cbdb6b3a19516857442e5bd2da0
SHA512449c68512d90a17f598e9dacfd6230e6e97bc6bfaaf2b06f3b91b370ece92e2322b81ee3721e288880fa1f05470156e519256e3f03d786c3b28a39788f5e0ad6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD517fbfbe3f04595e251287a6bfcdc35de
SHA1b576aabfd5e6d5799d487011506ed1ae70688987
SHA2562e61ae727ca01496c9418a65777d6d7e05a85cbdb6b3a19516857442e5bd2da0
SHA512449c68512d90a17f598e9dacfd6230e6e97bc6bfaaf2b06f3b91b370ece92e2322b81ee3721e288880fa1f05470156e519256e3f03d786c3b28a39788f5e0ad6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
C:\Users\Admin\AppData\Local\Temp\410ZzJtAuR.batFilesize
220B
MD50556079168cdd733a459083eae539802
SHA1b724716f647af66f14cadf6311b691bb92208683
SHA2567f0100993aa8a713bb5d3e81a64d444e41c4f7d9b4d5a1a46fccaf1b6588b645
SHA512fbfc054f3a8e6e60d0a7d59ba29f5a4a99c70907ecc5f0763a8e35b2d92636a339cab336dea8439e83ad1773b45f9c7b6e08bfdcc0cb64c3cdabc655f0cdcdab
-
C:\Users\Admin\AppData\Local\Temp\Kq4mDwN7mD.batFilesize
220B
MD557dc4ad055e9da0ccdc1ed2e5acd5cc6
SHA13cdff48a8988e2e474df48da4f78d4bc0c55dd3c
SHA256b1ec3886f41c70e80a5521abf8ac9a44a94a8d51aa9fe17e195d512d51050439
SHA512737afe4ea8e192967cacd4180ccb24f4f7de795a1218279b830496fc64372024d33cc82241f7dc387ebb3c3ea787f5484320118e8fc539de7c99d9f62ce2cfae
-
C:\Users\Admin\AppData\Local\Temp\LgxiiauvsB.batFilesize
220B
MD58b88c7f13f5b5ad0b5bc3a9d3e797a4c
SHA1123152d4fef43070122003701faaab0fbefa368b
SHA2566181647828fb7fb0229645e2a5b0b29386d961121bd8f6d8621140ac1cbd7615
SHA51243c02ffaf71a29d6ce312f5e8fac423d5dc5b4864dc3b2f9e8a5ac3f9b2c17d7baf3f08a3fac3459a1179a73ab4a07be81b1540b9a9df57404e492958d567ff8
-
C:\Users\Admin\AppData\Local\Temp\NczlPfxoCy.batFilesize
220B
MD514590597aa3c87d1dde96e45321ea973
SHA17884292eb9a383271f75d7df3ba570081b33f49b
SHA2567582653c7358f83a564565eabddf71ef12e1b741a15e4f01cd1e391a0dd5e92a
SHA512aa59131e442a020ffb9991c134f7d82b6c0e377b0841e0df799c8c0675e1e2be2ebadcb6ceb9d8fb469ef0f7208aa9dfba6c3cdc80a5708e56fd300454b65912
-
C:\Users\Admin\AppData\Local\Temp\RdAvGBYmjZ.batFilesize
220B
MD5a4dff2f947f6fcf6d98c052d87029e3a
SHA1bcf8f28072f4dec8d6c2dcc3ab2f132551c97741
SHA256247cdcf96e75d919e12c1a05a5006a2c2196176d21ce24bde18c2d0c9128cfb0
SHA512d58e47cccee14cf3b389eb003b2cf5270504aa81fd9df61a709e89bff599d781280eabd2970adfaf75d4580688d91d876ead10b089fdca42300c9de5b86b889a
-
C:\Users\Admin\AppData\Local\Temp\Zcl4dB2r8y.batFilesize
220B
MD516f9e9d15f3fab912ff7e0b2941ae781
SHA1cf6fbd140ad0aa3de9593380e6d98ded434d5800
SHA256bcb8cb676925e38996683bd772afa7312853c607213b2fb7fab85761b06a3757
SHA512cc0503870ad70497e3161921ad50b76facd790d9d79e032f8ee8fd6a37b9378ef2ad7e396a13560f1239764e80ce83a20a772d8e861abd9c54e37c4fc2c44a42
-
C:\Users\Admin\AppData\Local\Temp\cOf3pucYXi.batFilesize
220B
MD51eab9202e0c8d6481899c4a326e230ac
SHA1329a9d7db995a5a406a42aca2c7194d6637e6975
SHA2562a1ab13784edadb755d879b98de71650acda7ce9344792a5b02ed3f95e4f3a66
SHA5127af9e6f19b05f095e4c56188f4df49a47dc22b293c5f180b7246dd91c3e394fdfb3ab5a38e18b1548a534a61a1be494c39bf14ecea8c68197c6bc2982c7d6853
-
C:\Users\Admin\AppData\Local\Temp\hGj9C4kLBH.batFilesize
220B
MD5d91863d0050ac5a26401b91d09fd93f9
SHA1f2d0d875c220376b7539d5fb36011d44f47da92a
SHA256d76ddde9283b6cc705ee996cfad6a5fc8d44010f9a288e72519287f2b110ec42
SHA512e366c557eb06c0369c36220fad1ad7b2404b727f787b296b0fb3e6609d3ebf99972433d66db5bac4d4f03c68b2128c87cf7a30248bb9ff5b63bb0152708102e1
-
C:\Users\Admin\AppData\Local\Temp\jClCs9nEU3.batFilesize
220B
MD59c32bfc3e473ef8574afd96937ef355e
SHA1662247834de62bea82845c1aaea9a9ca81896d5b
SHA2565d2c7d29882371c588e4ce43e94bcd73435bfa4f9a212a11d1649151fa7e758a
SHA512159670a797cdf319fca313f1ca895002b6916196fe02eda75fd9618dfb0fe6a7eae021c5799c763393bedb288ce495dd13ee90074f671b1a4855b37f9faf7b1c
-
C:\Users\Admin\AppData\Local\Temp\nAABNdhKLs.batFilesize
220B
MD535b899416bf581ffbaad93c79c64dc66
SHA15b7fc722c520c3c7d694c86aa4412dbe6fb9e8de
SHA2561706b1906a9b6e08c70294ad32428785dff174c473d011e6cb4b65b67d3b4474
SHA5121033ff295d37fa302c8fd9dfc2b8024ea1db45ea301d3faef8e4496c8f6286addbfa2822bc0423ecaaac7544e5a560afe704065d8a956129167b0cfaa7c9f5b5
-
C:\Users\Admin\AppData\Local\Temp\rBMLF9HJtT.batFilesize
220B
MD575d70389230325c61a60564a126a25a7
SHA15e3740cfc6345910abe6cb8f09076d3b69318e88
SHA2565c77737746604aa3a308a3924dd17150135f971c81a5f1909674e1612c734af4
SHA512c44dc203a93ff2be99d093f3539d6a246f51cbe11914af123558c5321e17a54c1471fc12ec196122d29d35ecc70e2d218aa03257eaaf00a348efefb1a1673e65
-
C:\Users\All Users\SoftwareDistribution\fontdrvhost.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\providercommon\1zu9dW.batFilesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
C:\providercommon\DllCommonsvc.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\providercommon\DllCommonsvc.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbeFilesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
memory/216-220-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/216-177-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/216-156-0x0000000000000000-mapping.dmp
-
memory/536-142-0x0000000000000000-mapping.dmp
-
memory/536-200-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/536-160-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/780-279-0x0000000000000000-mapping.dmp
-
memory/872-188-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/872-225-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/872-159-0x0000000000000000-mapping.dmp
-
memory/932-273-0x00007FF81BAA0000-0x00007FF81C561000-memory.dmpFilesize
10.8MB
-
memory/932-147-0x0000000000000000-mapping.dmp
-
memory/932-269-0x00007FF81BAA0000-0x00007FF81C561000-memory.dmpFilesize
10.8MB
-
memory/932-267-0x0000000000000000-mapping.dmp
-
memory/932-208-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/932-172-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/1004-146-0x0000000000000000-mapping.dmp
-
memory/1004-196-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/1004-169-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/1324-144-0x0000000000000000-mapping.dmp
-
memory/1324-198-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/1324-165-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/1556-164-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/1556-248-0x00007FF81BAA0000-0x00007FF81C561000-memory.dmpFilesize
10.8MB
-
memory/1556-143-0x0000000000000000-mapping.dmp
-
memory/1556-252-0x00007FF81BAA0000-0x00007FF81C561000-memory.dmpFilesize
10.8MB
-
memory/1556-246-0x0000000000000000-mapping.dmp
-
memory/1556-194-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/1804-227-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/1804-179-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/1804-162-0x0000000000000000-mapping.dmp
-
memory/1816-214-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/1816-174-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/1816-149-0x0000000000000000-mapping.dmp
-
memory/2128-202-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/2128-171-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/2128-145-0x0000000000000000-mapping.dmp
-
memory/2144-153-0x0000000000000000-mapping.dmp
-
memory/2144-183-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/2144-218-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/2292-286-0x0000000000000000-mapping.dmp
-
memory/2500-158-0x0000000000000000-mapping.dmp
-
memory/2500-187-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/2500-222-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/2788-244-0x0000000000000000-mapping.dmp
-
memory/2844-245-0x00007FF81BAA0000-0x00007FF81C561000-memory.dmpFilesize
10.8MB
-
memory/2844-241-0x00007FF81BAA0000-0x00007FF81C561000-memory.dmpFilesize
10.8MB
-
memory/2844-239-0x0000000000000000-mapping.dmp
-
memory/3104-228-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/3104-178-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/3104-161-0x0000000000000000-mapping.dmp
-
memory/3320-251-0x0000000000000000-mapping.dmp
-
memory/3328-186-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/3328-180-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/3328-166-0x0000000000000000-mapping.dmp
-
memory/3488-170-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/3488-139-0x00000000000B0000-0x00000000001C0000-memory.dmpFilesize
1.1MB
-
memory/3488-136-0x0000000000000000-mapping.dmp
-
memory/3488-140-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/3508-191-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/3508-141-0x0000000000000000-mapping.dmp
-
memory/3508-150-0x00000283F0430000-0x00000283F0452000-memory.dmpFilesize
136KB
-
memory/3508-157-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/3548-260-0x0000000000000000-mapping.dmp
-
memory/3548-266-0x00007FF81BAA0000-0x00007FF81C561000-memory.dmpFilesize
10.8MB
-
memory/3548-262-0x00007FF81BAA0000-0x00007FF81C561000-memory.dmpFilesize
10.8MB
-
memory/3628-238-0x0000000000000000-mapping.dmp
-
memory/3784-298-0x0000000000000000-mapping.dmp
-
memory/3904-181-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/3904-230-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/3904-163-0x0000000000000000-mapping.dmp
-
memory/3940-258-0x0000000000000000-mapping.dmp
-
memory/4048-152-0x0000000000000000-mapping.dmp
-
memory/4048-175-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/4048-215-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/4108-265-0x0000000000000000-mapping.dmp
-
memory/4320-263-0x0000000000000000-mapping.dmp
-
memory/4448-135-0x0000000000000000-mapping.dmp
-
memory/4480-294-0x00007FF81BAA0000-0x00007FF81C561000-memory.dmpFilesize
10.8MB
-
memory/4480-290-0x00007FF81BAA0000-0x00007FF81C561000-memory.dmpFilesize
10.8MB
-
memory/4480-288-0x0000000000000000-mapping.dmp
-
memory/4588-295-0x0000000000000000-mapping.dmp
-
memory/4648-205-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/4648-173-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/4648-148-0x0000000000000000-mapping.dmp
-
memory/4972-132-0x0000000000000000-mapping.dmp
-
memory/4972-207-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/4972-151-0x0000000000000000-mapping.dmp
-
memory/4972-182-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/5048-154-0x0000000000000000-mapping.dmp
-
memory/5048-217-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/5048-185-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/5076-155-0x0000000000000000-mapping.dmp
-
memory/5076-213-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/5076-176-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/5220-242-0x0000000000000000-mapping.dmp
-
memory/5272-236-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/5272-234-0x00007FF81BE00000-0x00007FF81C8C1000-memory.dmpFilesize
10.8MB
-
memory/5272-231-0x0000000000000000-mapping.dmp
-
memory/5316-249-0x0000000000000000-mapping.dmp
-
memory/5468-256-0x0000000000000000-mapping.dmp
-
memory/5604-235-0x0000000000000000-mapping.dmp
-
memory/5624-259-0x00007FF81BAA0000-0x00007FF81C561000-memory.dmpFilesize
10.8MB
-
memory/5624-253-0x0000000000000000-mapping.dmp
-
memory/5624-255-0x00007FF81BAA0000-0x00007FF81C561000-memory.dmpFilesize
10.8MB
-
memory/5716-272-0x0000000000000000-mapping.dmp
-
memory/5768-276-0x00007FF81BAA0000-0x00007FF81C561000-memory.dmpFilesize
10.8MB
-
memory/5768-280-0x00007FF81BAA0000-0x00007FF81C561000-memory.dmpFilesize
10.8MB
-
memory/5768-274-0x0000000000000000-mapping.dmp
-
memory/5796-281-0x0000000000000000-mapping.dmp
-
memory/5796-287-0x00007FF81BAA0000-0x00007FF81C561000-memory.dmpFilesize
10.8MB
-
memory/5796-283-0x00007FF81BAA0000-0x00007FF81C561000-memory.dmpFilesize
10.8MB
-
memory/5828-277-0x0000000000000000-mapping.dmp
-
memory/5844-293-0x0000000000000000-mapping.dmp
-
memory/5864-291-0x0000000000000000-mapping.dmp
-
memory/5936-300-0x0000000000000000-mapping.dmp
-
memory/5988-184-0x0000000000000000-mapping.dmp
-
memory/6000-270-0x0000000000000000-mapping.dmp
-
memory/6084-284-0x0000000000000000-mapping.dmp
-
memory/6108-190-0x0000000000000000-mapping.dmp