Resubmissions

15-10-2023 15:31

231015-sx9b1aaf63 10

03-06-2023 11:19

230603-ne62psge66 10

12-04-2023 12:00

230412-n6gk5aca73 10

05-09-2022 16:12

220905-tny1cabffk 10

Analysis

  • max time kernel
    137s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-06-2023 11:19

General

  • Target

    $RDUQK6W.exe

  • Size

    10.5MB

  • MD5

    4a5a3ad1c74f3f7d525e1c97995ca649

  • SHA1

    cc0548dcbf4c0bc4489529e9148cf9f921485e84

  • SHA256

    19b66b877aa9324a2e9a51d828e1cab41b553070d37729096c555a7f1810fbb3

  • SHA512

    fbb94f6b670fbd6e32ac71b97cfe00d3c67a9747e1e4192ad1889bd8cf121b1b3bfe6e9fa0d4ba8634b5a8431b84c4ba7b3800bb6e128ce9ad759f952ac875b3

  • SSDEEP

    196608:OXBAqsvidH8HkLOogdmCvl6SsT2bygeHHNc8zKiSKu5GjY2+rZvPTetsi0ERHblh:vidcEiJtNUEMH6kXYj5etb0qHblVFV

Malware Config

Extracted

Family

allcome

C2

http://dba692117be7b6d3480fe5220fdd58b38bf.xyz/API/2/configure.php?cf6zrlhn=Raqxnd

Wallets

D7pq84u7ke73RmCkRPc1z2nKBfmfPrYLxM

rEPri1dB2B6TxxzBw31ihKwGkEEE3ZCzH2

0x379844563B2947bCf8Ee7660d674E91704ba85cc

XqcVZ9pP5YyEwfQ4RkVXC5mWZgQBY3qNNz

TT5o47UN2jDfvmbv7EQm8NZ3xw7NcpKhKB

t1Qc898xYxqJ2Vsrd2X15EA3L2QzNrCdZ6W

GB3TZL2PBSQOQAEFU57JPIFAXG7R73ECOSQGT3XCDCOAUGUWUKWAVO7H

4AqLHHmtMTQRWomEbPd8yxFdEsZ5VMXy1MvwhG1TTWgcCbGzgaAcfkA54K45UbQXjtBa3UYhmr8vYaGNGAkVTfXCE5bbT12

qrkkg7692gv3fz407lt8zxdxtx2d4zuf2q204ykdzn

1NipSzEWByjXUarhF2p3qq51MVbnnoo6HZ

0x08BDb0e0339E7B9A725FD665Fc17B3AA3FF73BFc

LQtxqhZWP3EDi9n1tVdKNyZVR6wrFRr7hN

+79889916188

+79889916188

+79889916188

LP1oSHdQ3kdgrWnPvB5XtuBLZaMq9JMoWt

ltc1qq5k32ja0yun36ydqhv6edd8ydpmfkfy6g5e994

bc1qngt9pchlwak6rzc37ez05sfhzr8dnyupu7e769

bc1qnx4g8m8lctzxm5wlcfpw2ae8zkf6nxerdujzuu

89CBob8FyychG8inyWBBhqUxbPFGzVaWnBZRdeFi8V38XRRv312X6ViMPxCuom3GKk8hLFmZYmTPQ1qMmq6YY8rCNCDeubb

Extracted

Family

colibri

Version

1.2.0

Botnet

Build1

C2

http://zpltcmgodhvvedxtfcygvbgjkvgvcguygytfigj.cc/gate.php

http://yugyuvyugguitgyuigtfyutdtoghghbbgyv.cx/gate.php

rc4.plain

Signatures

  • Allcome

    A clipbanker that supports stealing different cryptocurrency wallets and payment forms.

  • Colibri Loader

    A loader sold as MaaS first seen in August 2021.

  • Process spawned unexpected child process 57 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • UAC bypass 3 TTPs 3 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 14 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 57 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\$RDUQK6W.exe
    "C:\Users\Admin\AppData\Local\Temp\$RDUQK6W.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4652
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHUAbQBkACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEAagBoACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAG0AZABpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGkAbQByACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2244
    • C:\Windows\5779722125.exe
      "C:\Windows\5779722125.exe"
      2⤵
      • UAC bypass
      • Checks computer location settings
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3684
      • C:\Users\Admin\AppData\Local\Temp\tmp982E.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp982E.tmp.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3352
        • C:\Users\Admin\AppData\Local\Temp\tmp982E.tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\tmp982E.tmp.exe"
          4⤵
          • Executes dropped EXE
          PID:4796
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 3684 -s 1284
        3⤵
        • Program crash
        PID:4328
    • C:\Windows\XboxUpdate.exe
      "C:\Windows\XboxUpdate.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2056
      • C:\Users\Admin\AppData\Local\Temp\tmp96C6.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp96C6.tmp.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1440
        • C:\Users\Admin\AppData\Local\Temp\tmp96C6.tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\tmp96C6.tmp.exe"
          4⤵
          • Executes dropped EXE
          PID:2596
    • C:\Windows\Blitz.exe
      "C:\Windows\Blitz.exe"
      2⤵
        PID:4040
      • C:\Users\Admin\AppData\Local\Temp\Extreme Injector.exe
        "C:\Users\Admin\AppData\Local\Temp\Extreme Injector.exe"
        2⤵
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2724
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 10 /tr "'C:\Program Files\7-Zip\sihost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3844
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files\7-Zip\sihost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4448
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 12 /tr "'C:\Users\Public\Documents\My Music\SearchApp.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4260
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Documents\My Music\SearchApp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2116
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Users\Public\Documents\My Music\SearchApp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1392
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 14 /tr "'C:\Program Files\7-Zip\sihost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:428
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:5088
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3196
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Recovery\WindowsRE\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:5052
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\sppsvc.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4868
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default User\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3756
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\sppsvc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1936
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2200
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "upfc" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3024
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "upfcu" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\upfc.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2172
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Downloads\smss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4592
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Users\Admin\Downloads\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1120
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\services.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3680
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3136
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Downloads\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3292
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "servicess" /sc MINUTE /mo 6 /tr "'C:\Recovery\WindowsRE\services.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4384
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "57797221255" /sc MINUTE /mo 7 /tr "'C:\odt\5779722125.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1856
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "57797221255" /sc MINUTE /mo 6 /tr "'C:\odt\5779722125.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3184
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Microsoft\User Account Pictures\WmiPrvSE.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4428
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "5779722125" /sc ONLOGON /tr "'C:\odt\5779722125.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1636
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft\User Account Pictures\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3932
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Microsoft\User Account Pictures\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1652
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 12 /tr "'C:\Program Files\VideoLAN\VLC\locale\fi\WmiPrvSE.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3104
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\VideoLAN\VLC\locale\fi\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Executes dropped EXE
      • Creates scheduled task(s)
      PID:4040
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Program Files\VideoLAN\VLC\locale\fi\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4152
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 5 /tr "'C:\Windows\IME\IMEJP\DICTS\spoolsv.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4996
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\IME\IMEJP\DICTS\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3068
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "spoolsvs" /sc MINUTE /mo 8 /tr "'C:\Windows\IME\IMEJP\DICTS\spoolsv.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:224
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Multimedia Platform\unsecapp.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3988
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\unsecapp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4256
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Multimedia Platform\unsecapp.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4028
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Music\backgroundTaskHost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4728
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Users\Default\Music\backgroundTaskHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1080
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Music\backgroundTaskHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1044
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 8 /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\winlogon.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1572
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1972
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Program Files\Google\Chrome\Application\106.0.5249.119\winlogon.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3804
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Program Files\Common Files\microsoft shared\VSTO\WmiPrvSE.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3592
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\Common Files\microsoft shared\VSTO\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:392
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Program Files\Common Files\microsoft shared\VSTO\WmiPrvSE.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2668
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3164
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\smss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3668
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "smsss" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\smss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3448
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\3D Objects\csrss.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3020
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\3D Objects\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4580
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Microsoft\WinMSIPC\backgroundTaskHost.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2732
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft\WinMSIPC\backgroundTaskHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3756
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 10 /tr "'C:\Users\All Users\Microsoft\WinMSIPC\backgroundTaskHost.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:2976
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Admin\3D Objects\csrss.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:4700
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Temp\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:1852
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Google\Temp\RuntimeBroker.exe'" /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3116
    • C:\Windows\system32\schtasks.exe
      schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\Google\Temp\RuntimeBroker.exe'" /rl HIGHEST /f
      1⤵
      • Process spawned unexpected child process
      • Creates scheduled task(s)
      PID:3936
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 408 -p 3684 -ip 3684
      1⤵
        PID:3772

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Extreme Injector.exe

        Filesize

        1.9MB

        MD5

        ec801a7d4b72a288ec6c207bb9ff0131

        SHA1

        32eec2ae1f9e201516fa7fcdc16c4928f7997561

        SHA256

        b65f40618f584303ca0bcf9b5f88c233cc4237699c0c4bf40ba8facbe8195a46

        SHA512

        a07dd5e8241de73ce65ff8d74acef4942b85fc45cf6a7baafd3c0f9d330b08e7412f2023ba667e99b40e732a65e8fb4389f7fe73c7b6256ca71e63afe46cdcac

      • C:\Users\Admin\AppData\Local\Temp\Extreme Injector.exe

        Filesize

        1.9MB

        MD5

        ec801a7d4b72a288ec6c207bb9ff0131

        SHA1

        32eec2ae1f9e201516fa7fcdc16c4928f7997561

        SHA256

        b65f40618f584303ca0bcf9b5f88c233cc4237699c0c4bf40ba8facbe8195a46

        SHA512

        a07dd5e8241de73ce65ff8d74acef4942b85fc45cf6a7baafd3c0f9d330b08e7412f2023ba667e99b40e732a65e8fb4389f7fe73c7b6256ca71e63afe46cdcac

      • C:\Users\Admin\AppData\Local\Temp\Extreme Injector.exe

        Filesize

        1.9MB

        MD5

        ec801a7d4b72a288ec6c207bb9ff0131

        SHA1

        32eec2ae1f9e201516fa7fcdc16c4928f7997561

        SHA256

        b65f40618f584303ca0bcf9b5f88c233cc4237699c0c4bf40ba8facbe8195a46

        SHA512

        a07dd5e8241de73ce65ff8d74acef4942b85fc45cf6a7baafd3c0f9d330b08e7412f2023ba667e99b40e732a65e8fb4389f7fe73c7b6256ca71e63afe46cdcac

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_op1lpa4f.g0i.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • C:\Users\Admin\AppData\Local\Temp\tmp96C6.tmp.exe

        Filesize

        74KB

        MD5

        cdd3d44d9e64a113618961f0a4e691b9

        SHA1

        a762037bc50ddb7507d5ef1a20ce813ad990bb54

        SHA256

        dbeb4b5ef3a49b4df0bc816a52f875e5aa6ad674aa8e2b458e9736da0b366ec0

        SHA512

        55146e6464bf74266520341fae0b097ddfea1d6ed7fadf7e0dcf0eba7ac1c29384ad76f245994ea69f68dc85cdcdcb9fc4a2a1eede5db95001dbcd870505a3d8

      • C:\Users\Admin\AppData\Local\Temp\tmp96C6.tmp.exe

        Filesize

        74KB

        MD5

        cdd3d44d9e64a113618961f0a4e691b9

        SHA1

        a762037bc50ddb7507d5ef1a20ce813ad990bb54

        SHA256

        dbeb4b5ef3a49b4df0bc816a52f875e5aa6ad674aa8e2b458e9736da0b366ec0

        SHA512

        55146e6464bf74266520341fae0b097ddfea1d6ed7fadf7e0dcf0eba7ac1c29384ad76f245994ea69f68dc85cdcdcb9fc4a2a1eede5db95001dbcd870505a3d8

      • C:\Users\Admin\AppData\Local\Temp\tmp96C6.tmp.exe

        Filesize

        74KB

        MD5

        cdd3d44d9e64a113618961f0a4e691b9

        SHA1

        a762037bc50ddb7507d5ef1a20ce813ad990bb54

        SHA256

        dbeb4b5ef3a49b4df0bc816a52f875e5aa6ad674aa8e2b458e9736da0b366ec0

        SHA512

        55146e6464bf74266520341fae0b097ddfea1d6ed7fadf7e0dcf0eba7ac1c29384ad76f245994ea69f68dc85cdcdcb9fc4a2a1eede5db95001dbcd870505a3d8

      • C:\Users\Admin\AppData\Local\Temp\tmp96C6.tmp.exe

        Filesize

        74KB

        MD5

        cdd3d44d9e64a113618961f0a4e691b9

        SHA1

        a762037bc50ddb7507d5ef1a20ce813ad990bb54

        SHA256

        dbeb4b5ef3a49b4df0bc816a52f875e5aa6ad674aa8e2b458e9736da0b366ec0

        SHA512

        55146e6464bf74266520341fae0b097ddfea1d6ed7fadf7e0dcf0eba7ac1c29384ad76f245994ea69f68dc85cdcdcb9fc4a2a1eede5db95001dbcd870505a3d8

      • C:\Users\Admin\AppData\Local\Temp\tmp982E.tmp.exe

        Filesize

        74KB

        MD5

        cdd3d44d9e64a113618961f0a4e691b9

        SHA1

        a762037bc50ddb7507d5ef1a20ce813ad990bb54

        SHA256

        dbeb4b5ef3a49b4df0bc816a52f875e5aa6ad674aa8e2b458e9736da0b366ec0

        SHA512

        55146e6464bf74266520341fae0b097ddfea1d6ed7fadf7e0dcf0eba7ac1c29384ad76f245994ea69f68dc85cdcdcb9fc4a2a1eede5db95001dbcd870505a3d8

      • C:\Users\Admin\AppData\Local\Temp\tmp982E.tmp.exe

        Filesize

        74KB

        MD5

        cdd3d44d9e64a113618961f0a4e691b9

        SHA1

        a762037bc50ddb7507d5ef1a20ce813ad990bb54

        SHA256

        dbeb4b5ef3a49b4df0bc816a52f875e5aa6ad674aa8e2b458e9736da0b366ec0

        SHA512

        55146e6464bf74266520341fae0b097ddfea1d6ed7fadf7e0dcf0eba7ac1c29384ad76f245994ea69f68dc85cdcdcb9fc4a2a1eede5db95001dbcd870505a3d8

      • C:\Users\Admin\AppData\Local\Temp\tmp982E.tmp.exe

        Filesize

        74KB

        MD5

        cdd3d44d9e64a113618961f0a4e691b9

        SHA1

        a762037bc50ddb7507d5ef1a20ce813ad990bb54

        SHA256

        dbeb4b5ef3a49b4df0bc816a52f875e5aa6ad674aa8e2b458e9736da0b366ec0

        SHA512

        55146e6464bf74266520341fae0b097ddfea1d6ed7fadf7e0dcf0eba7ac1c29384ad76f245994ea69f68dc85cdcdcb9fc4a2a1eede5db95001dbcd870505a3d8

      • C:\Windows\5779722125.exe

        Filesize

        5.7MB

        MD5

        44e4646b76a889c2115bdacc6e63ba2a

        SHA1

        efe7c1dae715922ff19121ff4f0e97ca904ee536

        SHA256

        91169afa1085d0402983787772694f1e19f08f62c636683cf73e30cc9299bee8

        SHA512

        b4fc6250eb1b250e78571ecab8b301adcbb5f25a4faf42842f95bf8f73c8a3ba5ac2f64190e7f450a738aff4d495816ab9c7b4c894ff04db5754b5561c60717d

      • C:\Windows\5779722125.exe

        Filesize

        5.7MB

        MD5

        44e4646b76a889c2115bdacc6e63ba2a

        SHA1

        efe7c1dae715922ff19121ff4f0e97ca904ee536

        SHA256

        91169afa1085d0402983787772694f1e19f08f62c636683cf73e30cc9299bee8

        SHA512

        b4fc6250eb1b250e78571ecab8b301adcbb5f25a4faf42842f95bf8f73c8a3ba5ac2f64190e7f450a738aff4d495816ab9c7b4c894ff04db5754b5561c60717d

      • C:\Windows\5779722125.exe

        Filesize

        5.7MB

        MD5

        44e4646b76a889c2115bdacc6e63ba2a

        SHA1

        efe7c1dae715922ff19121ff4f0e97ca904ee536

        SHA256

        91169afa1085d0402983787772694f1e19f08f62c636683cf73e30cc9299bee8

        SHA512

        b4fc6250eb1b250e78571ecab8b301adcbb5f25a4faf42842f95bf8f73c8a3ba5ac2f64190e7f450a738aff4d495816ab9c7b4c894ff04db5754b5561c60717d

      • C:\Windows\Blitz.exe

        Filesize

        461KB

        MD5

        9c30b653d66d104fa03e85c9c5987c19

        SHA1

        1db5a95ca0e2303bc7bc69ce1259e59594cbeb4d

        SHA256

        6f38484383e3301e91664d2cf8cfdc9347c37fa2c11e9c03838484745f6f1ba2

        SHA512

        464b6e92be6e4c0b74161a1d3eecccd766e4ced0c7940ab235cc96e80703b391cf56142c6c256d8fd45498949fde9f5cc5a8977d89752fac0cca133410c4744d

      • C:\Windows\Blitz.exe

        Filesize

        461KB

        MD5

        9c30b653d66d104fa03e85c9c5987c19

        SHA1

        1db5a95ca0e2303bc7bc69ce1259e59594cbeb4d

        SHA256

        6f38484383e3301e91664d2cf8cfdc9347c37fa2c11e9c03838484745f6f1ba2

        SHA512

        464b6e92be6e4c0b74161a1d3eecccd766e4ced0c7940ab235cc96e80703b391cf56142c6c256d8fd45498949fde9f5cc5a8977d89752fac0cca133410c4744d

      • C:\Windows\Blitz.exe

        Filesize

        461KB

        MD5

        9c30b653d66d104fa03e85c9c5987c19

        SHA1

        1db5a95ca0e2303bc7bc69ce1259e59594cbeb4d

        SHA256

        6f38484383e3301e91664d2cf8cfdc9347c37fa2c11e9c03838484745f6f1ba2

        SHA512

        464b6e92be6e4c0b74161a1d3eecccd766e4ced0c7940ab235cc96e80703b391cf56142c6c256d8fd45498949fde9f5cc5a8977d89752fac0cca133410c4744d

      • C:\Windows\XboxUpdate.exe

        Filesize

        2.4MB

        MD5

        9539d670b998aa46651b51d69123b909

        SHA1

        77c4912a7b67260c486fda2f93a3b98ecb5e7d65

        SHA256

        52712a99b6b73458711a3af355c6b63a45457a9590964c835e08f6da84a09669

        SHA512

        9352b2c5c3b7f19a9c80bd574bd376d1db67cfcb8284abbab81b43efa881591a59cb25de0ff843d54bb958a05dccd783d342316a504bf8528f5e7b2cc02ee1aa

      • C:\Windows\XboxUpdate.exe

        Filesize

        2.4MB

        MD5

        9539d670b998aa46651b51d69123b909

        SHA1

        77c4912a7b67260c486fda2f93a3b98ecb5e7d65

        SHA256

        52712a99b6b73458711a3af355c6b63a45457a9590964c835e08f6da84a09669

        SHA512

        9352b2c5c3b7f19a9c80bd574bd376d1db67cfcb8284abbab81b43efa881591a59cb25de0ff843d54bb958a05dccd783d342316a504bf8528f5e7b2cc02ee1aa

      • C:\Windows\XboxUpdate.exe

        Filesize

        2.4MB

        MD5

        9539d670b998aa46651b51d69123b909

        SHA1

        77c4912a7b67260c486fda2f93a3b98ecb5e7d65

        SHA256

        52712a99b6b73458711a3af355c6b63a45457a9590964c835e08f6da84a09669

        SHA512

        9352b2c5c3b7f19a9c80bd574bd376d1db67cfcb8284abbab81b43efa881591a59cb25de0ff843d54bb958a05dccd783d342316a504bf8528f5e7b2cc02ee1aa

      • memory/2056-271-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-280-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-690-0x000000001BC20000-0x000000001BC30000-memory.dmp

        Filesize

        64KB

      • memory/2056-191-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-194-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-196-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-198-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-200-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-296-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-304-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-302-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-298-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-203-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-293-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-213-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-289-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-287-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-285-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-246-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-187-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-227-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-231-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-166-0x0000000000C80000-0x0000000000EF0000-memory.dmp

        Filesize

        2.4MB

      • memory/2056-236-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-242-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-184-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-256-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-260-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-253-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-185-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-265-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-268-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-177-0x000000001BC20000-0x000000001BC30000-memory.dmp

        Filesize

        64KB

      • memory/2056-273-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2056-275-0x000000001BF30000-0x000000001BFD2000-memory.dmp

        Filesize

        648KB

      • memory/2244-386-0x00000000732B0000-0x00000000732FC000-memory.dmp

        Filesize

        304KB

      • memory/2244-381-0x0000000006C40000-0x0000000006C72000-memory.dmp

        Filesize

        200KB

      • memory/2244-537-0x00000000072B0000-0x00000000072B8000-memory.dmp

        Filesize

        32KB

      • memory/2244-531-0x00000000072D0000-0x00000000072EA000-memory.dmp

        Filesize

        104KB

      • memory/2244-383-0x00000000046E0000-0x00000000046F0000-memory.dmp

        Filesize

        64KB

      • memory/2244-514-0x00000000071D0000-0x00000000071DE000-memory.dmp

        Filesize

        56KB

      • memory/2244-450-0x0000000007210000-0x00000000072A6000-memory.dmp

        Filesize

        600KB

      • memory/2244-431-0x0000000007010000-0x000000000701A000-memory.dmp

        Filesize

        40KB

      • memory/2244-188-0x00000000046E0000-0x00000000046F0000-memory.dmp

        Filesize

        64KB

      • memory/2244-422-0x0000000006F90000-0x0000000006FAA000-memory.dmp

        Filesize

        104KB

      • memory/2244-419-0x00000000075D0000-0x0000000007C4A000-memory.dmp

        Filesize

        6.5MB

      • memory/2244-219-0x0000000005670000-0x00000000056D6000-memory.dmp

        Filesize

        408KB

      • memory/2244-212-0x0000000005590000-0x00000000055F6000-memory.dmp

        Filesize

        408KB

      • memory/2244-190-0x00000000046E0000-0x00000000046F0000-memory.dmp

        Filesize

        64KB

      • memory/2244-294-0x0000000005C80000-0x0000000005C9E000-memory.dmp

        Filesize

        120KB

      • memory/2244-400-0x0000000006250000-0x000000000626E000-memory.dmp

        Filesize

        120KB

      • memory/2244-178-0x00000000046F0000-0x0000000004726000-memory.dmp

        Filesize

        216KB

      • memory/2244-183-0x0000000004D60000-0x0000000005388000-memory.dmp

        Filesize

        6.2MB

      • memory/2244-385-0x000000007EEF0000-0x000000007EF00000-memory.dmp

        Filesize

        64KB

      • memory/2244-202-0x0000000004CB0000-0x0000000004CD2000-memory.dmp

        Filesize

        136KB

      • memory/2596-257-0x0000000000400000-0x0000000000407000-memory.dmp

        Filesize

        28KB

      • memory/2596-283-0x0000000000400000-0x0000000000407000-memory.dmp

        Filesize

        28KB

      • memory/2724-192-0x000000001BD00000-0x000000001BD10000-memory.dmp

        Filesize

        64KB

      • memory/2724-1438-0x000000001BD00000-0x000000001BD10000-memory.dmp

        Filesize

        64KB

      • memory/2724-1439-0x000000001BD00000-0x000000001BD10000-memory.dmp

        Filesize

        64KB

      • memory/2724-313-0x000000001BD00000-0x000000001BD10000-memory.dmp

        Filesize

        64KB

      • memory/2724-221-0x000000001E7C0000-0x000000001E7D2000-memory.dmp

        Filesize

        72KB

      • memory/2724-1437-0x000000001BD00000-0x000000001BD10000-memory.dmp

        Filesize

        64KB

      • memory/2724-182-0x0000000000FF0000-0x00000000011D6000-memory.dmp

        Filesize

        1.9MB

      • memory/2724-247-0x000000001BD00000-0x000000001BD10000-memory.dmp

        Filesize

        64KB

      • memory/2724-1436-0x000000001BD00000-0x000000001BD10000-memory.dmp

        Filesize

        64KB

      • memory/2724-226-0x000000001E920000-0x000000001E95C000-memory.dmp

        Filesize

        240KB

      • memory/2724-1435-0x000000001BD00000-0x000000001BD10000-memory.dmp

        Filesize

        64KB

      • memory/2724-1434-0x000000001BD00000-0x000000001BD10000-memory.dmp

        Filesize

        64KB

      • memory/2724-1440-0x000000001BD00000-0x000000001BD10000-memory.dmp

        Filesize

        64KB

      • memory/2724-1089-0x000000001BD00000-0x000000001BD10000-memory.dmp

        Filesize

        64KB

      • memory/3684-249-0x000000001B610000-0x000000001B620000-memory.dmp

        Filesize

        64KB

      • memory/3684-1433-0x000000001B610000-0x000000001B620000-memory.dmp

        Filesize

        64KB

      • memory/3684-164-0x0000000000300000-0x00000000008C2000-memory.dmp

        Filesize

        5.8MB

      • memory/3684-1091-0x000000001C160000-0x000000001C260000-memory.dmp

        Filesize

        1024KB

      • memory/3684-940-0x000000001B610000-0x000000001B620000-memory.dmp

        Filesize

        64KB

      • memory/3684-1292-0x000000001B610000-0x000000001B620000-memory.dmp

        Filesize

        64KB

      • memory/3684-942-0x000000001C160000-0x000000001C260000-memory.dmp

        Filesize

        1024KB

      • memory/3684-1294-0x000000001C160000-0x000000001C260000-memory.dmp

        Filesize

        1024KB

      • memory/3684-315-0x000000001B610000-0x000000001B620000-memory.dmp

        Filesize

        64KB

      • memory/3684-442-0x000000001C160000-0x000000001C260000-memory.dmp

        Filesize

        1024KB

      • memory/3684-250-0x000000001B610000-0x000000001B620000-memory.dmp

        Filesize

        64KB

      • memory/3684-204-0x000000001B570000-0x000000001B5C0000-memory.dmp

        Filesize

        320KB

      • memory/3684-180-0x000000001B610000-0x000000001B620000-memory.dmp

        Filesize

        64KB

      • memory/3684-279-0x000000001B610000-0x000000001B620000-memory.dmp

        Filesize

        64KB