Resubmissions

10-04-2024 02:45

240410-c88xlscb89 10

10-04-2024 02:45

240410-c88a3scb88 10

10-04-2024 02:45

240410-c8631scb86 10

10-04-2024 02:45

240410-c86ggscb85 10

14-10-2023 02:07

231014-cj7cgsba81 10

Analysis

  • max time kernel
    1798s
  • max time network
    1800s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-04-2024 02:45

General

  • Target

    I63f8affb2294c837814c33f5446924ba.exe

  • Size

    89KB

  • MD5

    dfb3936eb972928af9ec106505364786

  • SHA1

    06a05bf8d2675ea58e44d3fdc0d9e610be021ca8

  • SHA256

    2d1765fd2323db0b7a1b2a4413f793bb6b3a544ed7ba19c1b0d9c4db80747a93

  • SHA512

    e71c24d1804792be45281e70e97d909817e18d0948dcaf86b3e49d22d9f085278b8d043613f1fee0468a28f9e10218ac2cce3315e4c1575f242b324f606e950f

  • SSDEEP

    1536:/JVNAuC4/P1xAqm9wRC+IWMVYJGOupb1cus6SQsjhp5cNbMQaZ9bqk4gxmsuZmQ+:fN//HAqm9wRC+IWMVYJGOubXsjL5wvsD

Malware Config

Signatures

  • Detect Gurcu Stealer V3 payload 3 IoCs
  • Gurcu, WhiteSnake

    Gurcu is a malware stealer written in C#.

  • Checks computer location settings 2 TTPs 32 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 62 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 64 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 23 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\I63f8affb2294c837814c33f5446924ba.exe
    "C:\Users\Admin\AppData\Local\Temp\I63f8affb2294c837814c33f5446924ba.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3528
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "I63f8affb2294c837814c33f5446924ba" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\I63f8affb2294c837814c33f5446924ba.exe" &&START "" "C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:440
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:4436
        • C:\Windows\system32\PING.EXE
          ping 127.0.0.1
          3⤵
          • Runs ping.exe
          PID:2188
        • C:\Windows\system32\schtasks.exe
          schtasks /create /tn "I63f8affb2294c837814c33f5446924ba" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe" /rl HIGHEST /f
          3⤵
          • Creates scheduled task(s)
          PID:1124
        • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
          "C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4424
          • C:\Windows\System32\tar.exe
            "C:\Windows\System32\tar.exe" -xvzf "C:\Users\Admin\AppData\Local\Temp\tmp3C0F.tmp" -C "C:\Users\Admin\AppData\Local\jdm9hu6p1h"
            4⤵
              PID:2808
            • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
              "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
              4⤵
              • Executes dropped EXE
              PID:1484
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3292
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:5096
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4848
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:2008
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1612
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:4932
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4404
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:4244
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2076
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:4420
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1432
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:4584
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2272
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:448
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1356
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:2216
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2380
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:1640
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1700
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:3136
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:532
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:3828
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1368
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:2912
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2108
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:852
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4828
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:3192
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3920
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:860
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2384
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:1928
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2352
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:2328
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4100
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:2088
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3484
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:3848
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4992
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:3264
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4920
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:884
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4912
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:2004
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5068
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:3044
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2144
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:884
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3276
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:2012
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2076
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:3684
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4344
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:1920
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4820
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:1380
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3284
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:644
      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:1620
        • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe
          "C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe" -f "C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt"
          2⤵
          • Executes dropped EXE
          PID:868

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\EsetSecurity\I63f8affb2294c837814c33f5446924ba.exe

        Filesize

        89KB

        MD5

        dfb3936eb972928af9ec106505364786

        SHA1

        06a05bf8d2675ea58e44d3fdc0d9e610be021ca8

        SHA256

        2d1765fd2323db0b7a1b2a4413f793bb6b3a544ed7ba19c1b0d9c4db80747a93

        SHA512

        e71c24d1804792be45281e70e97d909817e18d0948dcaf86b3e49d22d9f085278b8d043613f1fee0468a28f9e10218ac2cce3315e4c1575f242b324f606e950f

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\I63f8affb2294c837814c33f5446924ba.exe.log

        Filesize

        1KB

        MD5

        fc1be6f3f52d5c841af91f8fc3f790cb

        SHA1

        ac79b4229e0a0ce378ae22fc6104748c5f234511

        SHA256

        6da862f7c7feffca99cd58712ece93928c6ca6aed617f5d8c10a4718eaa2a910

        SHA512

        2f46165017309ee1a0c1b23e30a71e52e86ad8933e2649bf58c3f4628c5aa75659f5b8f6be32c2882f220b2f3ff2fd50d8766bf0a3708c94c2c634c051a05ea6

      • C:\Users\Admin\AppData\Local\Temp\installUtilLog.txt

        Filesize

        354B

        MD5

        7c6c9346fa9281a6a69836e9ae030f5f

        SHA1

        f2ab3f8b5e79f137ef2b09a1d9a94835d2625ce1

        SHA256

        8d892cc6bffdf13af28df718b3a62649b6d3959db36f3f3810848885030d534a

        SHA512

        2bedbf3a2fb1a40d4eb97681bbadf681397d08782e1898987d8f0d0d5f18fa170e4e8e20b883190d063060c6d3e786cf3ca987873517011b6a33517be911a5d8

      • C:\Users\Admin\AppData\Local\Temp\installUtilLog.txt

        Filesize

        472B

        MD5

        8ae0f863fcfcf29e8cb07af6fed5a67c

        SHA1

        2a67fb377436d920c8f7b44e1c21b21f9655b3fb

        SHA256

        9ec7469719496cac05f572d561a439c511c67b3551984e209e886976cd5d018b

        SHA512

        185b7233d4ed431bb579678268b0939374e676e606592183ad57ddbd3b39ea9cc0ecb245e5a793caaf6c4873af5183b237662a83d082b7fb7d2a37713cce269f

      • C:\Users\Admin\AppData\Local\Temp\installUtilLog.txt

        Filesize

        590B

        MD5

        72812dc6a0a51edfba9664e115b9ee6a

        SHA1

        361216a805d980de798591ce8ed58495d2b375b0

        SHA256

        2ebb3d8308631249a0e7d7b3313a691907e8b9ae7fdbe092cc528136bd58cf8f

        SHA512

        50e28754207f1966f241be13c61354c371efcb9987e1168fac87b34645e3bf8a5a19d4f3ec0198ccecec036048aad1667ec1595add4b9e3e3e91a5c777c50016

      • C:\Users\Admin\AppData\Local\Temp\installUtilLog.txt

        Filesize

        708B

        MD5

        ab8b053f72ef1f3c1c0a99c8ca6ae290

        SHA1

        b62dc2dfb2f40666573259ecafa0d4356c33b212

        SHA256

        5ebba1248b38dcc03272ffb3115fa8f545a6ea9eb1ccce5085e792fceda05ff5

        SHA512

        573c1dfca73e9134f45f6f1bc817a876de7d27e7a5599218ebec1d37b597b0abc2b3aef0e9154db2f000486574a9595e2b7f131226c4950b43a0061e778ce9d2

      • C:\Users\Admin\AppData\Local\Temp\installUtilLog.txt

        Filesize

        944B

        MD5

        2707aa90daf8bdd87fad2630ff4ad2d5

        SHA1

        ac1390859af235d9c225787f1e366a84cf8eb7da

        SHA256

        4d116b333284afa1b3d47b86e42f05d6066770debafea769d74c4be0f9ed0e63

        SHA512

        14b38e5e375ec09297b754919196930b4d1a634a2a992d08299f564d96b12662670f64a83f7d17f8fad283be8575b919add0a4dc3d8b9844e68880072082c1a2

      • C:\Users\Admin\AppData\Local\Temp\installUtilLog.txt

        Filesize

        1KB

        MD5

        9ed1cc2b032a212df5b47b00c509a316

        SHA1

        d907405176a2e551ed8c6078343f28c04e3e936e

        SHA256

        f0568c63643df034a703790c81d9fa931283eba1283a47451040e0b43bf7eeeb

        SHA512

        36839bf5171ee3bcc6a04d3a2d12ec288687c5d70d14e1dbb0d629df12719b8f3cd22b1d1edb7679f3635b432484bc3221da99497b33b715714575ea710363c6

      • C:\Users\Admin\AppData\Local\Temp\installUtilLog.txt

        Filesize

        1KB

        MD5

        5f329a7ec0808ab3eefdc5774484e56c

        SHA1

        d8d47aaeffdf035ca176b5a3271260d56bac085e

        SHA256

        658ab5a44a6bda030218a9a0513942bdbea2cc8f91073e0df929b374473088c2

        SHA512

        5991c1f7c99573bc6b241e4c0636c93747e3df9da8383eb50dbd9b21386101ac682edf115411cf04774b3dab06a648d0f856300001f7b37cd494f65c06c0576a

      • C:\Users\Admin\AppData\Local\Temp\installUtilLog.txt

        Filesize

        1KB

        MD5

        8f401b89bf2dd5a1a27143d06c6c483b

        SHA1

        90c8ed319ceaf18d3c693820ae7cc0282903e9d9

        SHA256

        4f8ff81c718825d0c2d3543e402507c9ea194b11828b5c7be8be53cd0fc36cc2

        SHA512

        48c6ad35235b79479bbf79795e64db207f3f2c6b58e2cfe9c977a75476bf23a20493d6490c1fed0f54e69eabe711dffa3d5bb269b29d102ae6d920f63613364f

      • C:\Users\Admin\AppData\Local\Temp\installUtilLog.txt

        Filesize

        1KB

        MD5

        e845bc5aa2a4df92767db25357bdd638

        SHA1

        2447edfb737ec4795fb6ee1563cc99e3c16b83d3

        SHA256

        cf0189a7cb46dee670b1407baad83b1687738ae0c71b853278514ddefa9d9402

        SHA512

        3639ca93a7e17619caae0a8aab6a652c143656ed4fd8453154dc85200e33fda0727c91b433f5ec62a8db946191cfc053b531ec7600558889bc5a686ed4ac4715

      • C:\Users\Admin\AppData\Local\Temp\installUtilLog.txt

        Filesize

        1KB

        MD5

        a111c909f9213355de0522fd227a37b0

        SHA1

        511268502a494231eac2a9a00040ec958b0c4db5

        SHA256

        bea9e2f6c49d454362b95f215bd0a2cb583b759b424b9ca08a31ce2d202386e5

        SHA512

        c54047bbca43ede50dca1d31828971dd206bd1100faf65c165a98d5871b8e9d53c05f6eb05fb90ba88c146e4169437c68b5d0ff3fb63ae81a999ba5145e40a16

      • C:\Users\Admin\AppData\Local\Temp\installUtilLog.txt

        Filesize

        1KB

        MD5

        db6fa9a9fd714e21bd427311874e28bd

        SHA1

        d9a96b5b05f87cc8787e2cf4311b74bb91bcf975

        SHA256

        f1e051c2f1bb7a9cbbc7f01c65ca753660be335d7edf9ed80b010285056429d2

        SHA512

        61795059ab9d323055761207dea859cf403717f706ebbd450d6725a8fe4282bf33b829362790cb3b3687578156dbe23239e9948e4d990ce9f8593abf752b3da5

      • C:\Users\Admin\AppData\Local\Temp\installUtilLog.txt

        Filesize

        1KB

        MD5

        0793faec569dc4eb5ce3317ab0ec11a3

        SHA1

        213670f8536156ac337b27c066e651f66e623e4e

        SHA256

        edeaf758dd8e775c1e791f1cb6aea2442668b336453a14d9b12f86df47f5a3e8

        SHA512

        f6a21aa664af4f7e6b2c4eb7e874fcd48fc90d5eadd5353c1dfd39436499ea9ef4e71316a26636107a692a719917e17d57e4f7038edee0a1da14f4fef374a96b

      • C:\Users\Admin\AppData\Local\Temp\installUtilLog.txt

        Filesize

        1KB

        MD5

        5afaff429e2110577053c5bdacd8d7b1

        SHA1

        da5e3fbfd729206693ea1fdf403d81429ea183cf

        SHA256

        2918db1c51bdd97fb371fe81553cb80593d67651cffb63fb22863c89b19a2508

        SHA512

        f8a9aa7085aead4cf6a01a70377d780f780f432a2008b3a4290f437860c4c9a9e1b0385c2bf2e52c0c1276131f19396d99185cc7a6924c889ebc254aee1f156b

      • C:\Users\Admin\AppData\Local\Temp\installUtilLog.txt

        Filesize

        1KB

        MD5

        1c9f149be007d8acf03f8b47efa3a301

        SHA1

        061f6b50063cbcb7bc949e947bbea7146bc831d5

        SHA256

        48a46ec62fead80ccadc031c3d26386136602fcbb79d4fb149e016a9c1ba0ad3

        SHA512

        a0328a1b17030398f9148d4f0a91ec87ee8388e099f42af2b28ddfa98b94925f3bf982e8e6c3229fa28d4e06b83cdb7cebee4891deb0dc23439a69e27639aef3

      • C:\Users\Admin\AppData\Local\Temp\installUtilLog.txt

        Filesize

        2KB

        MD5

        047e4aaa77eb58ffd29c2596a7da8f54

        SHA1

        0e268cf99005703ea1f56278a8e58b694ac2f4ab

        SHA256

        9311a4fc372bad782f3f192708c8db119e541f22902b8f8bae3d32a2b959ea63

        SHA512

        28f07426f9348d3365eaa3bca1ec0a55deca31f4fa4eabad631f862bb3b9750ae5b5a0c9f06edd6a735b263fc323b45cae37b2c9c1b11575e4855195eb1e5663

      • C:\Users\Admin\AppData\Local\Temp\installUtilLog.txt

        Filesize

        236B

        MD5

        e88a699758dc57d79c484fb98d2aeb5f

        SHA1

        4d9bbd78365a7f8b362366d38467e6d87d41461f

        SHA256

        ec915076ea7c0a99c1e84bcdb8dd2e5ca52a19a5f67961b60a3280e39f21d682

        SHA512

        49be2ac96d58c0336113d7c8b1e347773e52df5163f1ed61b2bac853e47b7e93f0238c845328d65be2709f53b303dc8d476c7abdf269e50f17186113be6bbca9

      • C:\Users\Admin\AppData\Local\Temp\tmp3C0F.tmp

        Filesize

        13.3MB

        MD5

        89d2d5811c1aff539bb355f15f3ddad0

        SHA1

        5bb3577c25b6d323d927200c48cd184a3e27c873

        SHA256

        b630008f6d3887793d48b87091e56691e292894dd4fa100dc4a418a2f29dcc12

        SHA512

        39e576124c54143520c5435a2ef9b24506131e13403489c0692f09b89135015d611c4988d4772f8a1e6557fa68b4667d467334461009cee8c2227dfc3e295289

      • C:\Users\Admin\AppData\Local\jdm9hu6p1h\data\cached-microdesc-consensus.tmp

        Filesize

        2.7MB

        MD5

        a0db8a87f7b723266c8b04255da46b06

        SHA1

        4df00ea56d22d88f3d2e005ef66bad5b3ef92ebf

        SHA256

        60b43cdce0f807f7891521f396f53def34a7d98986dbde0faa2a197189c587f3

        SHA512

        41b8fc467d11af7ca6a42c7e94d1b8295ab3ae5d6d186b4f378e6e079440520e8324b695da1134beb2bc1697d2491edcc70c1b75ab6fc66b9c1cb2ecbcdb4a7d

      • C:\Users\Admin\AppData\Local\jdm9hu6p1h\data\cached-microdescs.new

        Filesize

        8.9MB

        MD5

        e15b7fdfe40793901a6e2a490d71081d

        SHA1

        1614214171a8cad17334e531c1084830012862a8

        SHA256

        4e38661c14691973b3393c374edc54176477b53c5f5de12bebb0add6521a12d9

        SHA512

        a0b374b05949d84d423c9d0193192dcf4408f48bb7446543e2c05aa205be0e3ed96b641a94da2d71f749f06a4f0ad8290d594a1ce307f577944016a757d59057

      • C:\Users\Admin\AppData\Local\jdm9hu6p1h\host\hostname

        Filesize

        64B

        MD5

        afc5223e5e0a3a031e9da922854f4891

        SHA1

        f3024add30b4ac0bee5d3948dc230e6a428c5f4f

        SHA256

        cce8f9ad264f6af0b8676c320236a01f1325d8a1fd101e5c97fd4b97674a8b8f

        SHA512

        9e23ef9b6366245832ad0a2ce0b6f1b7ef51c431732627b2f346b232023f6d61f22e654aecf88f1426fda0ccbd99e1b9bd1b90ef40b05736e1ecc854e13f4a19

      • C:\Users\Admin\AppData\Local\jdm9hu6p1h\port.dat

        Filesize

        4B

        MD5

        db90f689b1567600818428ca3dfc88a3

        SHA1

        7e6b7c5530ce3326f3a3ecff291473cf0cbbd361

        SHA256

        2b084c9efd9150fb848e4efb0b5f03f455470f68b153814944e14a6204ec5b9a

        SHA512

        ff624d7364a486ee68327b56a07aa57b5066960c3747278d64b1cfd816729733f03a787bf6dc426d760ab81ef2bba1fac3a8b36dacdc5252cc00ff85c8693c9e

      • C:\Users\Admin\AppData\Local\jdm9hu6p1h\tor\tor.exe

        Filesize

        7.4MB

        MD5

        88590909765350c0d70c6c34b1f31dd2

        SHA1

        129b27c3926e53e5df6d44cc6adf39c3a8d9ebf7

        SHA256

        46fe244b548265c78ab961e8f787bc8bf21edbcaaf175fa3b8be3137c6845a82

        SHA512

        a8af08d9169a31a1c3419d4e6e8fbe608c800d323840563b5a560d3e09e78a492201f07cc0d3864efbff8ad81e59885fc43a6b749e0a3377aa8555df258af192

      • C:\Users\Admin\AppData\Local\jdm9hu6p1h\torrc.txt

        Filesize

        218B

        MD5

        ef7830f2fcaee7fdab4ae1aa260fc626

        SHA1

        f7442ae5d3d02d82315bac2e777591f87a1cf239

        SHA256

        acc0b566686d080b12fcb32af1ec303b1b6fa6a00ea73030e71d0f5e3ee76d21

        SHA512

        6ecb481a901d1987aedef2b82322b69a77d0403bb56a473411532c7f11ef72b7399429a0b583c88bf32eeb6e113850d753f4e9256bec9c72abb15322b2ddd62b

      • memory/532-204-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/532-208-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/1356-166-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/1356-170-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/1368-218-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/1368-214-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/1432-138-0x000001287A040000-0x000001287A050000-memory.dmp

        Filesize

        64KB

      • memory/1432-137-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/1432-142-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/1612-101-0x0000027BF4710000-0x0000027BF4720000-memory.dmp

        Filesize

        64KB

      • memory/1612-100-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/1612-105-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/1700-194-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/1700-190-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/2076-123-0x000001CD3E2E0000-0x000001CD3E2F0000-memory.dmp

        Filesize

        64KB

      • memory/2076-122-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/2076-127-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/2108-232-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/2108-228-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/2272-152-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/2272-148-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/2352-281-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/2352-285-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/2380-176-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/2380-180-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/2384-267-0x000002849BD70000-0x000002849BD80000-memory.dmp

        Filesize

        64KB

      • memory/2384-271-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/2384-266-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/3292-66-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/3292-67-0x0000016639520000-0x0000016639530000-memory.dmp

        Filesize

        64KB

      • memory/3292-75-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/3484-308-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/3484-305-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/3528-6-0x00007FF9804F0000-0x00007FF980FB1000-memory.dmp

        Filesize

        10.8MB

      • memory/3528-0-0x00000211407C0000-0x00000211407DC000-memory.dmp

        Filesize

        112KB

      • memory/3528-2-0x000002115AE80000-0x000002115AE90000-memory.dmp

        Filesize

        64KB

      • memory/3528-1-0x00007FF9804F0000-0x00007FF980FB1000-memory.dmp

        Filesize

        10.8MB

      • memory/3920-260-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/3920-256-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/4100-295-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/4100-291-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/4404-116-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/4404-111-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/4404-112-0x000001AE94660000-0x000001AE94670000-memory.dmp

        Filesize

        64KB

      • memory/4424-62-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/4424-64-0x000001F2FAA70000-0x000001F2FAA80000-memory.dmp

        Filesize

        64KB

      • memory/4424-11-0x000001F2FAA70000-0x000001F2FAA80000-memory.dmp

        Filesize

        64KB

      • memory/4424-10-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/4828-246-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/4828-250-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/4848-89-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/4848-90-0x0000027BC57C0000-0x0000027BC57D0000-memory.dmp

        Filesize

        64KB

      • memory/4848-94-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/4912-344-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/4912-342-0x000001E1B0D80000-0x000001E1B0D90000-memory.dmp

        Filesize

        64KB

      • memory/4912-341-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/4920-336-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/4920-334-0x0000015918550000-0x0000015918560000-memory.dmp

        Filesize

        64KB

      • memory/4920-333-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/4992-320-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/4992-318-0x0000026E1A250000-0x0000026E1A260000-memory.dmp

        Filesize

        64KB

      • memory/4992-317-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/5068-353-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB

      • memory/5068-355-0x00007FF97E750000-0x00007FF97F211000-memory.dmp

        Filesize

        10.8MB