Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    106s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/02/2023, 05:40

General

  • Target

    6aee5efbe8b6f925024931c75a39c84722a44c938f415f2016566ffe08acbde6.exe

  • Size

    1.3MB

  • MD5

    5e78efc6d0d63bf1d3d6702512ff1fc5

  • SHA1

    f417dd0f2e638d9c2cc366d4fc536f4b4b03e9f1

  • SHA256

    6aee5efbe8b6f925024931c75a39c84722a44c938f415f2016566ffe08acbde6

  • SHA512

    cb1b0278d80901ce4e2a627d19a1c7a5421f1fb88aaa3ecef392cf042a2227b9fc9a3616c0336eec8e7aa7a3bc1b41a977851d2f0f54d5d218d022babf4361ad

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Score
10/10

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Process spawned unexpected child process 64 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 8 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 64 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6aee5efbe8b6f925024931c75a39c84722a44c938f415f2016566ffe08acbde6.exe
    "C:\Users\Admin\AppData\Local\Temp\6aee5efbe8b6f925024931c75a39c84722a44c938f415f2016566ffe08acbde6.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2648
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:1952
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4088
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4652
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\debug\dllhost.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:888
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Globalization\ELS\sppsvc.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3364
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\dllhost.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4552
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\backgroundTaskHost.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4672
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\taskhostw.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4544
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Packages\Microsoft.SkypeApp_kzf8qxf38zg5c\dllhost.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3516
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\sihost.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4368
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\RuntimeBroker.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4592
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\csrss.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4224
          • C:\providercommon\DllCommonsvc.exe
            "C:\providercommon\DllCommonsvc.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in Program Files directory
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:928
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3748
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\WmiPrvSE.exe'
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2860
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Help\sppsvc.exe'
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4796
            • C:\providercommon\DllCommonsvc.exe
              "C:\providercommon\DllCommonsvc.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Drops file in Windows directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2548
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4812
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\conhost.exe'
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:532
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\conhost.exe'
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2788
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\winlogon.exe'
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1804
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\conhost.exe'
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4704
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Prefetch\dllhost.exe'
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4000
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\es-ES\powershell.exe'
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1936
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\AccountPictures\conhost.exe'
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2172
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\System.exe'
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1044
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\powershell.exe'
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1252
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\lsass.exe'
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2572
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Photo Viewer\conhost.exe'
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4720
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Templates\fontdrvhost.exe'
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1792
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Mail\dwm.exe'
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4340
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\fontdrvhost.exe'
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4772
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\AppData\csrss.exe'
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:952
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\powershell.exe'
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:396
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\powershell.exe'
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:5324
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\powershell.exe'
                7⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:5372
              • C:\Recovery\WindowsRE\System.exe
                "C:\Recovery\WindowsRE\System.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:5760
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Videos\SppExtComObj.exe'
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4188
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\powershell.exe'
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4548
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Internet Explorer\taskhostw.exe'
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1424
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows NT\TableTextService\explorer.exe'
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3796
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\debug\dllhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    PID:364
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\debug\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2628
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Windows\debug\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3620
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Windows\Globalization\ELS\sppsvc.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:980
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\Globalization\ELS\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3080
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Windows\Globalization\ELS\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    PID:220
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 13 /tr "'C:\providercommon\dllhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    PID:4860
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    PID:2240
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\providercommon\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2708
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\Packages\Microsoft.SkypeApp_kzf8qxf38zg5c\dllhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3392
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\All Users\Packages\Microsoft.SkypeApp_kzf8qxf38zg5c\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2236
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Packages\Microsoft.SkypeApp_kzf8qxf38zg5c\dllhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    PID:3724
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 9 /tr "'C:\odt\backgroundTaskHost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    PID:2768
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\odt\backgroundTaskHost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3280
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 13 /tr "'C:\odt\backgroundTaskHost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4976
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 5 /tr "'C:\providercommon\taskhostw.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4164
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\providercommon\taskhostw.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4024
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 6 /tr "'C:\providercommon\taskhostw.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1176
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "explorere" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\explorer.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1900
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows NT\TableTextService\explorer.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4536
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "explorere" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows NT\TableTextService\explorer.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1296
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\sihost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    PID:3308
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\sihost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    PID:1008
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\sihost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:1624
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 13 /tr "'C:\Users\Public\csrss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4364
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Public\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3644
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Users\Public\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3748
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Program Files\Windows Portable Devices\RuntimeBroker.exe'" /f
    1⤵
    • Process spawned unexpected child process
    PID:3744
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files\Windows Portable Devices\RuntimeBroker.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    PID:4504
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows Portable Devices\RuntimeBroker.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    PID:988
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Users\Default\WmiPrvSE.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3624
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\Default\WmiPrvSE.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    PID:3064
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 5 /tr "'C:\Users\Default\WmiPrvSE.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:720
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 5 /tr "'C:\Program Files\Internet Explorer\taskhostw.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4704
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\taskhostw.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    PID:3080
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 5 /tr "'C:\Program Files\Internet Explorer\taskhostw.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:212
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "powershellp" /sc MINUTE /mo 9 /tr "'C:\odt\powershell.exe'" /f
    1⤵
    • Process spawned unexpected child process
    PID:2240
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "powershell" /sc ONLOGON /tr "'C:\odt\powershell.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4372
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "powershellp" /sc MINUTE /mo 12 /tr "'C:\odt\powershell.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    PID:5112
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Videos\SppExtComObj.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4164
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Users\Public\Videos\SppExtComObj.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    PID:3848
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 8 /tr "'C:\Users\Public\Videos\SppExtComObj.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    PID:4536
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Windows\Help\sppsvc.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3408
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\Help\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:5020
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Windows\Help\sppsvc.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    PID:3648
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "powershell" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\powershell.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:5100
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "powershellp" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\powershell.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4940
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "powershellp" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\powershell.exe'" /f
    1⤵
    • Process spawned unexpected child process
    PID:2964
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Users\Default\AppData\csrss.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2244
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default\AppData\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3620
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 9 /tr "'C:\Users\Default\AppData\csrss.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    PID:3660
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\providercommon\fontdrvhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    • Drops file in Program Files directory
    • Creates scheduled task(s)
    • Suspicious use of WriteProcessMemory
    PID:4088
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\providercommon\fontdrvhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3744
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\providercommon\fontdrvhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    PID:1896
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Mail\dwm.exe'" /f
    1⤵
    • Process spawned unexpected child process
    PID:1956
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Mail\dwm.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4764
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\Admin\Templates\fontdrvhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4004
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Templates\fontdrvhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    PID:5000
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Photo Viewer\conhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:4360
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\odt\lsass.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:980
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "powershellp" /sc MINUTE /mo 12 /tr "'C:\odt\powershell.exe'" /f
    1⤵
    • Process spawned unexpected child process
    PID:1148
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\providercommon\conhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:2264
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\conhost.exe'" /rl HIGHEST /f
    1⤵
    • Process spawned unexpected child process
    • Creates scheduled task(s)
    PID:3312
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\providercommon\conhost.exe'" /f
    1⤵
    • Process spawned unexpected child process
    PID:3816
  • C:\Windows\system32\schtasks.exe
    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 14 /tr "'C:\Windows\Prefetch\dllhost.exe'" /rl HIGHEST /f
    1⤵
      PID:3720
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "powershellp" /sc MINUTE /mo 12 /tr "'C:\Windows\es-ES\powershell.exe'" /rl HIGHEST /f
      1⤵
        PID:3416
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "powershellp" /sc MINUTE /mo 10 /tr "'C:\odt\powershell.exe'" /rl HIGHEST /f
        1⤵
          PID:1232
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "powershell" /sc ONLOGON /tr "'C:\odt\powershell.exe'" /rl HIGHEST /f
          1⤵
            PID:4200
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "powershellp" /sc MINUTE /mo 8 /tr "'C:\odt\powershell.exe'" /f
            1⤵
            • Creates scheduled task(s)
            PID:4092
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "powershellp" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\powershell.exe'" /rl HIGHEST /f
            1⤵
            • Creates scheduled task(s)
            PID:3440
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "powershell" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\powershell.exe'" /rl HIGHEST /f
            1⤵
              PID:4540
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn "powershellp" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\powershell.exe'" /f
              1⤵
                PID:4212
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "powershell" /sc ONLOGON /tr "'C:\Windows\es-ES\powershell.exe'" /rl HIGHEST /f
                1⤵
                • Creates scheduled task(s)
                PID:2224
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "powershellp" /sc MINUTE /mo 7 /tr "'C:\Windows\es-ES\powershell.exe'" /f
                1⤵
                • Creates scheduled task(s)
                PID:4636
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\Prefetch\dllhost.exe'" /rl HIGHEST /f
                1⤵
                • Creates scheduled task(s)
                PID:3824
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 11 /tr "'C:\Windows\Prefetch\dllhost.exe'" /f
                1⤵
                • Creates scheduled task(s)
                PID:3856
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\providercommon\conhost.exe'" /rl HIGHEST /f
                1⤵
                • Creates scheduled task(s)
                PID:2348
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\providercommon\conhost.exe'" /rl HIGHEST /f
                1⤵
                • Creates scheduled task(s)
                PID:4828
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /rl HIGHEST /f
                1⤵
                • Creates scheduled task(s)
                PID:4780
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /rl HIGHEST /f
                1⤵
                • Creates scheduled task(s)
                PID:1300
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Recovery\WindowsRE\winlogon.exe'" /f
                1⤵
                • Creates scheduled task(s)
                PID:3568
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Users\Public\AccountPictures\conhost.exe'" /rl HIGHEST /f
                1⤵
                • Creates scheduled task(s)
                PID:220
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Users\Public\AccountPictures\conhost.exe'" /f
                1⤵
                • Creates scheduled task(s)
                PID:3552
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f
                1⤵
                • Creates scheduled task(s)
                PID:4820
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\System.exe'" /rl HIGHEST /f
                1⤵
                • Creates scheduled task(s)
                PID:1816
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\System.exe'" /f
                1⤵
                • Creates scheduled task(s)
                PID:4456
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\providercommon\conhost.exe'" /rl HIGHEST /f
                1⤵
                • Creates scheduled task(s)
                PID:3580
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\providercommon\conhost.exe'" /f
                1⤵
                • Creates scheduled task(s)
                PID:1824
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "powershellp" /sc MINUTE /mo 14 /tr "'C:\odt\powershell.exe'" /rl HIGHEST /f
                1⤵
                • Creates scheduled task(s)
                PID:832
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "powershell" /sc ONLOGON /tr "'C:\odt\powershell.exe'" /rl HIGHEST /f
                1⤵
                • Creates scheduled task(s)
                PID:1696
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 10 /tr "'C:\odt\conhost.exe'" /rl HIGHEST /f
                1⤵
                • Creates scheduled task(s)
                PID:1404
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\odt\conhost.exe'" /rl HIGHEST /f
                1⤵
                  PID:4832
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 12 /tr "'C:\odt\conhost.exe'" /f
                  1⤵
                  • Creates scheduled task(s)
                  PID:2372
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\odt\lsass.exe'" /rl HIGHEST /f
                  1⤵
                    PID:1840
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "lsassl" /sc MINUTE /mo 7 /tr "'C:\odt\lsass.exe'" /f
                    1⤵
                    • Creates scheduled task(s)
                    PID:4292
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\conhost.exe'" /rl HIGHEST /f
                    1⤵
                    • Creates scheduled task(s)
                    PID:2616
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Windows Photo Viewer\conhost.exe'" /f
                    1⤵
                      PID:3012
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Users\Admin\Templates\fontdrvhost.exe'" /f
                      1⤵
                      • Creates scheduled task(s)
                      PID:2792
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Windows Mail\dwm.exe'" /rl HIGHEST /f
                      1⤵
                        PID:4760

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Recovery\WindowsRE\System.exe

                        Filesize

                        1.0MB

                        MD5

                        bd31e94b4143c4ce49c17d3af46bcad0

                        SHA1

                        f8c51ff3ff909531d9469d4ba1bbabae101853ff

                        SHA256

                        b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                        SHA512

                        f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                      • C:\Recovery\WindowsRE\System.exe

                        Filesize

                        1.0MB

                        MD5

                        bd31e94b4143c4ce49c17d3af46bcad0

                        SHA1

                        f8c51ff3ff909531d9469d4ba1bbabae101853ff

                        SHA256

                        b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                        SHA512

                        f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\DllCommonsvc.exe.log

                        Filesize

                        1KB

                        MD5

                        7f3c0ae41f0d9ae10a8985a2c327b8fb

                        SHA1

                        d58622bf6b5071beacf3b35bb505bde2000983e3

                        SHA256

                        519fceae4d0dd4d09edd1b81bcdfa8aeab4b59eee77a4cd4b6295ce8e591a900

                        SHA512

                        8a8fd17eef071f86e672cba0d8fc2cfed6118aff816100b9d7c06eb96443c04c04bc5692259c8d7ecb1563e877921939c61726605af4f969e3f586f0913ed125

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                        Filesize

                        2KB

                        MD5

                        d85ba6ff808d9e5444a4b369f5bc2730

                        SHA1

                        31aa9d96590fff6981b315e0b391b575e4c0804a

                        SHA256

                        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                        SHA512

                        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        bd5940f08d0be56e65e5f2aaf47c538e

                        SHA1

                        d7e31b87866e5e383ab5499da64aba50f03e8443

                        SHA256

                        2d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6

                        SHA512

                        c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        bd5940f08d0be56e65e5f2aaf47c538e

                        SHA1

                        d7e31b87866e5e383ab5499da64aba50f03e8443

                        SHA256

                        2d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6

                        SHA512

                        c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        d28a889fd956d5cb3accfbaf1143eb6f

                        SHA1

                        157ba54b365341f8ff06707d996b3635da8446f7

                        SHA256

                        21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                        SHA512

                        0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        d28a889fd956d5cb3accfbaf1143eb6f

                        SHA1

                        157ba54b365341f8ff06707d996b3635da8446f7

                        SHA256

                        21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                        SHA512

                        0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        d28a889fd956d5cb3accfbaf1143eb6f

                        SHA1

                        157ba54b365341f8ff06707d996b3635da8446f7

                        SHA256

                        21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                        SHA512

                        0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        d28a889fd956d5cb3accfbaf1143eb6f

                        SHA1

                        157ba54b365341f8ff06707d996b3635da8446f7

                        SHA256

                        21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                        SHA512

                        0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        d28a889fd956d5cb3accfbaf1143eb6f

                        SHA1

                        157ba54b365341f8ff06707d996b3635da8446f7

                        SHA256

                        21e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45

                        SHA512

                        0b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        3a6bad9528f8e23fb5c77fbd81fa28e8

                        SHA1

                        f127317c3bc6407f536c0f0600dcbcf1aabfba36

                        SHA256

                        986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05

                        SHA512

                        846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        3a6bad9528f8e23fb5c77fbd81fa28e8

                        SHA1

                        f127317c3bc6407f536c0f0600dcbcf1aabfba36

                        SHA256

                        986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05

                        SHA512

                        846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        66c1af19164d3b08179f388a26c2bde9

                        SHA1

                        599bb2101a033126bc82001419b94a3467fe86f2

                        SHA256

                        48950437c36bb693eae5049f0eef84824d76169e0cd736590b401b0713be3b30

                        SHA512

                        5b575918813e354824c07ac91ea7c1fb121d903065d1f2cab92393ae215825b1392c50f8658a5c482c6a1fdd9922b1f29f9f34fe53a584169285cbe0ea10a17b

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        c94af379fe0d2afdabe4476dc7232198

                        SHA1

                        ae6ebf37fd84cf66dcd330e998f972a4d0a21b72

                        SHA256

                        7a1017d506434a4bd30a8ab78c064881313d14d95bc8b4e13589824b4caf9a07

                        SHA512

                        80e112fe35b27c0e85b657ec158583faf742157f27e8ff00ea1e4f3d688ac173bd154bb0dec19aee43f7035c2b4b7156373a52f0642773dee0a01fcb37844144

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        c94af379fe0d2afdabe4476dc7232198

                        SHA1

                        ae6ebf37fd84cf66dcd330e998f972a4d0a21b72

                        SHA256

                        7a1017d506434a4bd30a8ab78c064881313d14d95bc8b4e13589824b4caf9a07

                        SHA512

                        80e112fe35b27c0e85b657ec158583faf742157f27e8ff00ea1e4f3d688ac173bd154bb0dec19aee43f7035c2b4b7156373a52f0642773dee0a01fcb37844144

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        669da47b4b9fbd5be73aa95dae38ae5b

                        SHA1

                        5118811981f4c9dcf0c4c4225824563f917bccda

                        SHA256

                        649b913bb8af13c4c91937cb2675287e92b71f9f8afa0a15575b99b7316ce0e0

                        SHA512

                        7b554e7cbccd9896c7feb4e8f78d9e2652f04e4696d8a745e0a462b91a43044487e6d4a50dea6853624d32b76445bdf44e10e338ceb32eeeeaa6d8e5f9423b41

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        fdf15f7d08f3f7538ae67e5b3e5d23f4

                        SHA1

                        953ff0529053ce3a1930b4f5abba2364a8befbfc

                        SHA256

                        9f4964b9cf2c6d4915a8f2b9746dc5ff73d6f327c81370f92e0e7a611b28a707

                        SHA512

                        4fee933635376d1467e0be63d12fa897f83cbbf9cdd1ac79cce30dfaa2621d47e137e991b701f1ed9910767904dbfb6b89db2a02ce32edc410c83351f351d7ed

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        fdf15f7d08f3f7538ae67e5b3e5d23f4

                        SHA1

                        953ff0529053ce3a1930b4f5abba2364a8befbfc

                        SHA256

                        9f4964b9cf2c6d4915a8f2b9746dc5ff73d6f327c81370f92e0e7a611b28a707

                        SHA512

                        4fee933635376d1467e0be63d12fa897f83cbbf9cdd1ac79cce30dfaa2621d47e137e991b701f1ed9910767904dbfb6b89db2a02ce32edc410c83351f351d7ed

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        669da47b4b9fbd5be73aa95dae38ae5b

                        SHA1

                        5118811981f4c9dcf0c4c4225824563f917bccda

                        SHA256

                        649b913bb8af13c4c91937cb2675287e92b71f9f8afa0a15575b99b7316ce0e0

                        SHA512

                        7b554e7cbccd9896c7feb4e8f78d9e2652f04e4696d8a745e0a462b91a43044487e6d4a50dea6853624d32b76445bdf44e10e338ceb32eeeeaa6d8e5f9423b41

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        669da47b4b9fbd5be73aa95dae38ae5b

                        SHA1

                        5118811981f4c9dcf0c4c4225824563f917bccda

                        SHA256

                        649b913bb8af13c4c91937cb2675287e92b71f9f8afa0a15575b99b7316ce0e0

                        SHA512

                        7b554e7cbccd9896c7feb4e8f78d9e2652f04e4696d8a745e0a462b91a43044487e6d4a50dea6853624d32b76445bdf44e10e338ceb32eeeeaa6d8e5f9423b41

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        f5ea6e485a296269f874f3d12709ce50

                        SHA1

                        c73e5adec8ceef00e49e0f51d382b990fc5b4d4c

                        SHA256

                        980d5cc1b33f9995ce40b593bac646373b613070e5ca6da2c297c5fb8c1f28c3

                        SHA512

                        09e3083c712ae875d1dae3d4c903e96e6f5e97f5a15d4301319d3f6f63b2e704ce1b728704fd4ada7f0c26b782b05b551f961db8775f7527b1b1b224e7478659

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        f5ea6e485a296269f874f3d12709ce50

                        SHA1

                        c73e5adec8ceef00e49e0f51d382b990fc5b4d4c

                        SHA256

                        980d5cc1b33f9995ce40b593bac646373b613070e5ca6da2c297c5fb8c1f28c3

                        SHA512

                        09e3083c712ae875d1dae3d4c903e96e6f5e97f5a15d4301319d3f6f63b2e704ce1b728704fd4ada7f0c26b782b05b551f961db8775f7527b1b1b224e7478659

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        f5ea6e485a296269f874f3d12709ce50

                        SHA1

                        c73e5adec8ceef00e49e0f51d382b990fc5b4d4c

                        SHA256

                        980d5cc1b33f9995ce40b593bac646373b613070e5ca6da2c297c5fb8c1f28c3

                        SHA512

                        09e3083c712ae875d1dae3d4c903e96e6f5e97f5a15d4301319d3f6f63b2e704ce1b728704fd4ada7f0c26b782b05b551f961db8775f7527b1b1b224e7478659

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        f5ea6e485a296269f874f3d12709ce50

                        SHA1

                        c73e5adec8ceef00e49e0f51d382b990fc5b4d4c

                        SHA256

                        980d5cc1b33f9995ce40b593bac646373b613070e5ca6da2c297c5fb8c1f28c3

                        SHA512

                        09e3083c712ae875d1dae3d4c903e96e6f5e97f5a15d4301319d3f6f63b2e704ce1b728704fd4ada7f0c26b782b05b551f961db8775f7527b1b1b224e7478659

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        7e289a3d34516b4e7de2611b6c12f0b2

                        SHA1

                        e8e03cc1bfdc8ba943a4b3d63096972fa17709a0

                        SHA256

                        0b4cbf3ad8768569a414f60e265701cdf7ebb2d2f5a32519d72604ead942f97f

                        SHA512

                        ce91056d04768defa621cbd08c03892a5861ee620fcb9ee5a376f9f884ebb8bff7f53f28c351093baca1f7be767a37ed4e52ee7dc77fa6d5b645001c05b47ca9

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        7e289a3d34516b4e7de2611b6c12f0b2

                        SHA1

                        e8e03cc1bfdc8ba943a4b3d63096972fa17709a0

                        SHA256

                        0b4cbf3ad8768569a414f60e265701cdf7ebb2d2f5a32519d72604ead942f97f

                        SHA512

                        ce91056d04768defa621cbd08c03892a5861ee620fcb9ee5a376f9f884ebb8bff7f53f28c351093baca1f7be767a37ed4e52ee7dc77fa6d5b645001c05b47ca9

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        7e289a3d34516b4e7de2611b6c12f0b2

                        SHA1

                        e8e03cc1bfdc8ba943a4b3d63096972fa17709a0

                        SHA256

                        0b4cbf3ad8768569a414f60e265701cdf7ebb2d2f5a32519d72604ead942f97f

                        SHA512

                        ce91056d04768defa621cbd08c03892a5861ee620fcb9ee5a376f9f884ebb8bff7f53f28c351093baca1f7be767a37ed4e52ee7dc77fa6d5b645001c05b47ca9

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        7e289a3d34516b4e7de2611b6c12f0b2

                        SHA1

                        e8e03cc1bfdc8ba943a4b3d63096972fa17709a0

                        SHA256

                        0b4cbf3ad8768569a414f60e265701cdf7ebb2d2f5a32519d72604ead942f97f

                        SHA512

                        ce91056d04768defa621cbd08c03892a5861ee620fcb9ee5a376f9f884ebb8bff7f53f28c351093baca1f7be767a37ed4e52ee7dc77fa6d5b645001c05b47ca9

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        9bc110200117a3752313ca2acaf8a9e1

                        SHA1

                        fda6b7da2e7b0175b391475ca78d1b4cf2147cd3

                        SHA256

                        c88e4bbb64f7fa31429ebe82c1cf07785c44486f37576f783a26ac856e02a4eb

                        SHA512

                        1f1af32aa18a8cbfcc65b0d4fb7e6ca2705f125eaa85789e981ee68b90c64522e954825abf460d4b4f97567715dfae8d9b0a25a4d54d10bc4c257c472f2e80fb

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        944B

                        MD5

                        7e289a3d34516b4e7de2611b6c12f0b2

                        SHA1

                        e8e03cc1bfdc8ba943a4b3d63096972fa17709a0

                        SHA256

                        0b4cbf3ad8768569a414f60e265701cdf7ebb2d2f5a32519d72604ead942f97f

                        SHA512

                        ce91056d04768defa621cbd08c03892a5861ee620fcb9ee5a376f9f884ebb8bff7f53f28c351093baca1f7be767a37ed4e52ee7dc77fa6d5b645001c05b47ca9

                      • C:\odt\e978f868350d50

                        Filesize

                        983B

                        MD5

                        ddc146a7f579dd72797a78b27ac172a8

                        SHA1

                        aa6298585b969290c9a254cf54cebd58d82b340e

                        SHA256

                        4308d1563111d24b6c09a71e0f33762f277f1f6b13f6474ef60e7e2419a28eef

                        SHA512

                        30d3e01e3f5151bc50aa305116c627c700e5859e5f028ba1ccf77bae749f700f90c60bcb9974d93dfc42ace06573b015e435c9a059be9614e2aced87f25210e6

                      • C:\odt\powershell.exe

                        Filesize

                        1.0MB

                        MD5

                        bd31e94b4143c4ce49c17d3af46bcad0

                        SHA1

                        f8c51ff3ff909531d9469d4ba1bbabae101853ff

                        SHA256

                        b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                        SHA512

                        f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                      • C:\providercommon\1zu9dW.bat

                        Filesize

                        36B

                        MD5

                        6783c3ee07c7d151ceac57f1f9c8bed7

                        SHA1

                        17468f98f95bf504cc1f83c49e49a78526b3ea03

                        SHA256

                        8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                        SHA512

                        c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                      • C:\providercommon\DllCommonsvc.exe

                        Filesize

                        1.0MB

                        MD5

                        bd31e94b4143c4ce49c17d3af46bcad0

                        SHA1

                        f8c51ff3ff909531d9469d4ba1bbabae101853ff

                        SHA256

                        b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                        SHA512

                        f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                      • C:\providercommon\DllCommonsvc.exe

                        Filesize

                        1.0MB

                        MD5

                        bd31e94b4143c4ce49c17d3af46bcad0

                        SHA1

                        f8c51ff3ff909531d9469d4ba1bbabae101853ff

                        SHA256

                        b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                        SHA512

                        f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                      • C:\providercommon\DllCommonsvc.exe

                        Filesize

                        1.0MB

                        MD5

                        bd31e94b4143c4ce49c17d3af46bcad0

                        SHA1

                        f8c51ff3ff909531d9469d4ba1bbabae101853ff

                        SHA256

                        b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                        SHA512

                        f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                      • C:\providercommon\DllCommonsvc.exe

                        Filesize

                        1.0MB

                        MD5

                        bd31e94b4143c4ce49c17d3af46bcad0

                        SHA1

                        f8c51ff3ff909531d9469d4ba1bbabae101853ff

                        SHA256

                        b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                        SHA512

                        f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                      • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                        Filesize

                        197B

                        MD5

                        8088241160261560a02c84025d107592

                        SHA1

                        083121f7027557570994c9fc211df61730455bb5

                        SHA256

                        2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                        SHA512

                        20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                      • memory/396-258-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/396-222-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/532-233-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/888-157-0x000002572C0A0000-0x000002572C0C2000-memory.dmp

                        Filesize

                        136KB

                      • memory/888-164-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/888-194-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/928-177-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/928-163-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/952-225-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/1044-248-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/1252-249-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/1424-180-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/1424-218-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/1792-231-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/1804-252-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/1936-250-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/2172-242-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/2548-246-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/2548-186-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/2572-240-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/2788-245-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/2860-179-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/2860-221-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3364-153-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3364-189-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3516-158-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3516-190-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3748-215-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3748-178-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3796-192-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/3796-167-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4000-254-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4088-139-0x0000000000FC0000-0x00000000010D0000-memory.dmp

                        Filesize

                        1.1MB

                      • memory/4088-140-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4088-159-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4188-216-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4188-182-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4224-171-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4224-187-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4340-238-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4368-197-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4368-161-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4544-165-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4544-193-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4548-236-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4548-181-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4552-195-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4552-155-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4592-162-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4592-198-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4652-152-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4652-191-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4672-160-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4672-188-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4704-253-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4720-239-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4720-260-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4772-229-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4796-196-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4796-219-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/4812-232-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/5324-255-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/5372-256-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/5760-251-0x00007FFE49800000-0x00007FFE4A2C1000-memory.dmp

                        Filesize

                        10.8MB