Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-10-2024 19:01

General

  • Target

    4363463463464363463463463.exe

  • Size

    10KB

  • MD5

    2a94f3960c58c6e70826495f76d00b85

  • SHA1

    e2a1a5641295f5ebf01a37ac1c170ac0814bb71a

  • SHA256

    2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce

  • SHA512

    fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f

  • SSDEEP

    192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K

Malware Config

Extracted

Family

amadey

Version

5.03

Botnet

7c4393

C2

http://185.215.113.217

Attributes
  • install_dir

    f9c76c1660

  • install_file

    corept.exe

  • strings_key

    9808a67f01d2f0720518035acbde7521

  • url_paths

    /CoreOPT/index.php

rc4.plain

Extracted

Family

vidar

Version

11.1

Botnet

df523263f44cc8d55414a260a0197e4a

C2

https://steamcommunity.com/profiles/76561199786602107

https://t.me/lpnjoke

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:130.0) Gecko/20100101 Firefox/130.0

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Agenttesla family
  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 3 IoCs
  • Modifies security service 2 TTPs 3 IoCs
  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Nanocore family
  • Phorphiex family
  • Phorphiex payload 3 IoCs
  • Phorphiex, Phorpiex

    Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 11 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Windows security bypass 2 TTPs 18 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 7 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 24 IoCs
  • Loads dropped DLL 5 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 21 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 12 IoCs
  • Launches sc.exe 15 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 56 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: SetClipboardViewer 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3320
      • C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe
        "C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"
        2⤵
        • Checks computer location settings
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4800
        • C:\Users\Admin\AppData\Local\Temp\Files\t1.exe
          "C:\Users\Admin\AppData\Local\Temp\Files\t1.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4232
          • C:\Windows\sysklnorbcv.exe
            C:\Windows\sysklnorbcv.exe
            4⤵
            • Modifies security service
            • Windows security bypass
            • Checks computer location settings
            • Executes dropped EXE
            • Windows security modification
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3068
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2440
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
                6⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:5044
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2504
              • C:\Windows\SysWOW64\sc.exe
                sc stop UsoSvc
                6⤵
                • Launches sc.exe
                • System Location Discovery: System Language Discovery
                PID:3336
              • C:\Windows\SysWOW64\sc.exe
                sc stop WaaSMedicSvc
                6⤵
                • Launches sc.exe
                • System Location Discovery: System Language Discovery
                PID:2580
              • C:\Windows\SysWOW64\sc.exe
                sc stop wuauserv
                6⤵
                • Launches sc.exe
                • System Location Discovery: System Language Discovery
                PID:4652
              • C:\Windows\SysWOW64\sc.exe
                sc stop DoSvc
                6⤵
                • Launches sc.exe
                • System Location Discovery: System Language Discovery
                PID:760
              • C:\Windows\SysWOW64\sc.exe
                sc stop BITS
                6⤵
                • Launches sc.exe
                • System Location Discovery: System Language Discovery
                PID:2788
            • C:\Users\Admin\AppData\Local\Temp\75608328.exe
              C:\Users\Admin\AppData\Local\Temp\75608328.exe
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4676
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
                6⤵
                  PID:5024
                  • C:\Windows\system32\reg.exe
                    reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
                    7⤵
                      PID:848
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"
                    6⤵
                      PID:2024
                      • C:\Windows\system32\schtasks.exe
                        schtasks /delete /f /tn "Windows Upgrade Manager"
                        7⤵
                          PID:3300
                    • C:\Users\Admin\AppData\Local\Temp\1672332105.exe
                      C:\Users\Admin\AppData\Local\Temp\1672332105.exe
                      5⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:4356
                    • C:\Users\Admin\AppData\Local\Temp\2042823420.exe
                      C:\Users\Admin\AppData\Local\Temp\2042823420.exe
                      5⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:4064
                      • C:\Users\Admin\AppData\Local\Temp\2654516695.exe
                        C:\Users\Admin\AppData\Local\Temp\2654516695.exe
                        6⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2404
                    • C:\Users\Admin\AppData\Local\Temp\234414530.exe
                      C:\Users\Admin\AppData\Local\Temp\234414530.exe
                      5⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:4232
                • C:\Users\Admin\AppData\Local\Temp\Files\splwow64.exe
                  "C:\Users\Admin\AppData\Local\Temp\Files\splwow64.exe"
                  3⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:3928
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c copy Beijing Beijing.bat & Beijing.bat
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:704
                    • C:\Windows\SysWOW64\tasklist.exe
                      tasklist
                      5⤵
                      • Enumerates processes with tasklist
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4832
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr /I "wrsa opssvc"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:3560
                    • C:\Windows\SysWOW64\tasklist.exe
                      tasklist
                      5⤵
                      • Enumerates processes with tasklist
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3268
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:2680
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c md 197036
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:3900
                    • C:\Windows\SysWOW64\findstr.exe
                      findstr /V "CRAWFORDFILLEDVERIFYSCALE" Mtv
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:2200
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c copy /b ..\Twisted + ..\Molecular + ..\Sponsorship + ..\Various + ..\Witch + ..\Spirit + ..\See + ..\Fitting T
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:1960
                    • C:\Users\Admin\AppData\Local\Temp\197036\Jurisdiction.pif
                      Jurisdiction.pif T
                      5⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of WriteProcessMemory
                      PID:2388
                    • C:\Windows\SysWOW64\choice.exe
                      choice /d y /t 5
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:3340
                • C:\Users\Admin\AppData\Local\Temp\Files\bandwidth_monitor.exe
                  "C:\Users\Admin\AppData\Local\Temp\Files\bandwidth_monitor.exe"
                  3⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  PID:3752
                • C:\Users\Admin\AppData\Local\Temp\Files\vidar.exe
                  "C:\Users\Admin\AppData\Local\Temp\Files\vidar.exe"
                  3⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Checks processor information in registry
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1172
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\JKEGHDGHCGHD" & exit
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:3916
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout /t 10
                      5⤵
                      • System Location Discovery: System Language Discovery
                      • Delays execution with timeout.exe
                      PID:4164
                • C:\Users\Admin\AppData\Local\Temp\Files\ggg.exe
                  "C:\Users\Admin\AppData\Local\Temp\Files\ggg.exe"
                  3⤵
                  • Executes dropped EXE
                  PID:2876
                  • C:\Users\Admin\AppData\Local\Temp\Files\ggg.exe
                    "C:\Users\Admin\AppData\Local\Temp\Files\ggg.exe"
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:364
                • C:\Users\Admin\AppData\Local\Temp\Files\ngown.exe
                  "C:\Users\Admin\AppData\Local\Temp\Files\ngown.exe"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:4384
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    "C:\Users\Admin\AppData\Local\Temp\Files\ngown.exe"
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4876
                • C:\Users\Admin\AppData\Local\Temp\Files\Set_up.exe
                  "C:\Users\Admin\AppData\Local\Temp\Files\Set_up.exe"
                  3⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:232
                • C:\Users\Admin\AppData\Local\Temp\Files\aaa.exe
                  "C:\Users\Admin\AppData\Local\Temp\Files\aaa.exe"
                  3⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:5064
                • C:\Users\Admin\AppData\Local\Temp\Files\nefor.exe
                  "C:\Users\Admin\AppData\Local\Temp\Files\nefor.exe"
                  3⤵
                  • Executes dropped EXE
                  PID:3456
                • C:\Users\Admin\AppData\Local\Temp\Files\pi.exe
                  "C:\Users\Admin\AppData\Local\Temp\Files\pi.exe"
                  3⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:2828
                  • C:\Windows\sysppvrdnvs.exe
                    C:\Windows\sysppvrdnvs.exe
                    4⤵
                    • Modifies security service
                    • Windows security bypass
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Windows security modification
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: SetClipboardViewer
                    PID:2980
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:444
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
                        6⤵
                        • Command and Scripting Interpreter: PowerShell
                        • System Location Discovery: System Language Discovery
                        PID:5024
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:776
                      • C:\Windows\SysWOW64\sc.exe
                        sc stop UsoSvc
                        6⤵
                        • Launches sc.exe
                        • System Location Discovery: System Language Discovery
                        PID:2584
                      • C:\Windows\SysWOW64\sc.exe
                        sc stop WaaSMedicSvc
                        6⤵
                        • Launches sc.exe
                        • System Location Discovery: System Language Discovery
                        PID:4020
                      • C:\Windows\SysWOW64\sc.exe
                        sc stop wuauserv
                        6⤵
                        • Launches sc.exe
                        • System Location Discovery: System Language Discovery
                        PID:2696
                      • C:\Windows\SysWOW64\sc.exe
                        sc stop DoSvc
                        6⤵
                        • Launches sc.exe
                        • System Location Discovery: System Language Discovery
                        PID:3744
                      • C:\Windows\SysWOW64\sc.exe
                        sc stop BITS /wait
                        6⤵
                        • Launches sc.exe
                        • System Location Discovery: System Language Discovery
                        PID:3652
                • C:\Users\Admin\AppData\Local\Temp\Files\s.exe
                  "C:\Users\Admin\AppData\Local\Temp\Files\s.exe"
                  3⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:628
                  • C:\Windows\sysvplervcs.exe
                    C:\Windows\sysvplervcs.exe
                    4⤵
                    • Modifies security service
                    • Windows security bypass
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Windows security modification
                    • System Location Discovery: System Language Discovery
                    PID:4672
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:4424
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"
                        6⤵
                        • Command and Scripting Interpreter: PowerShell
                        • System Location Discovery: System Language Discovery
                        PID:2164
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS /wait
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:1536
                      • C:\Windows\SysWOW64\sc.exe
                        sc stop UsoSvc
                        6⤵
                        • Launches sc.exe
                        • System Location Discovery: System Language Discovery
                        PID:1948
                      • C:\Windows\SysWOW64\sc.exe
                        sc stop WaaSMedicSvc
                        6⤵
                        • Launches sc.exe
                        • System Location Discovery: System Language Discovery
                        PID:3252
                      • C:\Windows\SysWOW64\sc.exe
                        sc stop wuauserv
                        6⤵
                        • Launches sc.exe
                        • System Location Discovery: System Language Discovery
                        PID:3816
                      • C:\Windows\SysWOW64\sc.exe
                        sc stop DoSvc
                        6⤵
                        • Launches sc.exe
                        • System Location Discovery: System Language Discovery
                        PID:4368
                      • C:\Windows\SysWOW64\sc.exe
                        sc stop BITS /wait
                        6⤵
                        • Launches sc.exe
                        • System Location Discovery: System Language Discovery
                        PID:2960
                • C:\Users\Admin\AppData\Local\Temp\Files\Survox.exe
                  "C:\Users\Admin\AppData\Local\Temp\Files\Survox.exe"
                  3⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Checks whether UAC is enabled
                  • Drops file in Program Files directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious behavior: SetClipboardViewer
                  PID:1652
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c schtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F
                2⤵
                • System Location Discovery: System Language Discovery
                PID:3224
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks.exe /create /tn "Wall" /tr "wscript //B 'C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js'" /sc minute /mo 5 /F
                  3⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:2580
              • C:\Windows\SysWOW64\cmd.exe
                cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & echo URL="C:\Users\Admin\AppData\Local\GreenTech Dynamics\EcoCraft.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoCraft.url" & exit
                2⤵
                • Drops startup file
                • System Location Discovery: System Language Discovery
                PID:4468
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3240
              • C:\Windows\System32\schtasks.exe
                C:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"
                2⤵
                  PID:1336
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
                  2⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4984
                • C:\Windows\System32\conhost.exe
                  C:\Windows\System32\conhost.exe
                  2⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  PID:2968
                • C:\Windows\System32\dwm.exe
                  C:\Windows\System32\dwm.exe
                  2⤵
                    PID:4084
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#ydcfdz#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
                    2⤵
                    • Command and Scripting Interpreter: PowerShell
                    PID:540
                  • C:\Windows\System32\schtasks.exe
                    C:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"
                    2⤵
                      PID:3744
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
                      2⤵
                      • Command and Scripting Interpreter: PowerShell
                      PID:940
                    • C:\Windows\System32\dwm.exe
                      C:\Windows\System32\dwm.exe
                      2⤵
                        PID:2340
                    • C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe
                      "C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"
                      1⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4072
                    • C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe
                      "C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"
                      1⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:2564

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\9PMCFZKU\1[1]

                      Filesize

                      108KB

                      MD5

                      1fcb78fb6cf9720e9d9494c42142d885

                      SHA1

                      fef9c2e728ab9d56ce9ed28934b3182b6f1d5379

                      SHA256

                      84652bb8c63ca4fd7eb7a2d6ef44029801f3057aa2961867245a3a765928dd02

                      SHA512

                      cdf58e463af1784aea86995b3e5d6b07701c5c4095e30ec80cc901ffd448c6f4f714c521bf8796ffa8c47538bf8bf5351e157596efaa7ab88155d63dc33f7dc3

                    • C:\Users\Admin\AppData\Local\Temp\197036\Jurisdiction.pif

                      Filesize

                      872KB

                      MD5

                      18ce19b57f43ce0a5af149c96aecc685

                      SHA1

                      1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

                      SHA256

                      d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

                      SHA512

                      a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

                    • C:\Users\Admin\AppData\Local\Temp\197036\T

                      Filesize

                      580KB

                      MD5

                      4b0812fabc1ba34d8d45d28180f6c75f

                      SHA1

                      b9d99c00a6f9d5f23e244cc0555f82a7d0eeb950

                      SHA256

                      73312c3ea63faf89e2067e034a9148bf73efb5140c1ba6a67aaf62170ee98103

                      SHA512

                      7f72ffd39f7b66ea701ec642a427c90f9c3ee9be69a3e431c492be76ae9a73e8b2b1fbb16553a5a6d8722baf30b2a392a47c7c998d618459bf398d47d218d158

                    • C:\Users\Admin\AppData\Local\Temp\442511616637

                      Filesize

                      78KB

                      MD5

                      2a9edd233f9771abc5889dc0bc79fe0b

                      SHA1

                      386d8e379fd62ba7ebd4ce464c035be72b9ce565

                      SHA256

                      5bb57379729dd2813db3ed210c6a1036c657d11ad28a004589b61b36f80e5d0e

                      SHA512

                      ab7e7e8fa166f751b2a564e0bdd6bb7f8e4d06810dbb87ceb2eb2470aaf168ffbf349c25a2e9e977178dec752c1c2131a5025b3a9af19d1af088b282cd40b3db

                    • C:\Users\Admin\AppData\Local\Temp\Beijing

                      Filesize

                      24KB

                      MD5

                      2a84a77ad125a30e442d57c63c18e00e

                      SHA1

                      68567ee0d279087a12374c10a8b7981f401b20b8

                      SHA256

                      0c6ead18e99077a5dde401987a0674b156c07ccf9b7796768df8e881923e1769

                      SHA512

                      9d6a720f970f8d24ed4c74bed25c5e21c90191930b0cc7e310c8dd45f6ed7a0b3d9b3abbd8f0b4979f992c90630d215b1852b3242c5d0a6e7a42ecef03c0076a

                    • C:\Users\Admin\AppData\Local\Temp\Files\Set_up.exe

                      Filesize

                      72KB

                      MD5

                      7f44b7e2fdf3d5b7ace267e04a1013ff

                      SHA1

                      5f9410958df31fb32db0a8b5c9fa20d73510ce33

                      SHA256

                      64ffa88cf0b0129f4ececeb716e5577f65f1572b2cb6a3f4a0f1edc8cf0c3d4f

                      SHA512

                      d2f0673a892535c4b397000f60f581effa938fdd4b606cf1bebcef3268416d41a1f235100b07dcae4827f1624e1e79187c2513ca88a5f4a90776af8dbaad89ae

                    • C:\Users\Admin\AppData\Local\Temp\Files\Survox.exe

                      Filesize

                      552KB

                      MD5

                      06a9fb51c5455ef7c06cdad4f015c96b

                      SHA1

                      9cdcae44885e4e2e9a742810ce63c18662d617bc

                      SHA256

                      ce3ae4549b58a5304de4c262ac272aa5da715b63edd796de299c861330a4a8d6

                      SHA512

                      7c797b1780c0ef768a98bf04e8d560c8a6366b2cdc31d1be26cf0dc750cf490110df8bab71be29f00a8804998ac3f30235d48cebb5b56e79569ce59123ed4ba7

                    • C:\Users\Admin\AppData\Local\Temp\Files\aaa.exe

                      Filesize

                      19KB

                      MD5

                      1318fbc69b729539376cb6c9ac3cee4c

                      SHA1

                      753090b4ffaa151317517e8925712dd02908fe9e

                      SHA256

                      e972fb08a4dcde8d09372f78fe67ba283618288432cdb7d33015fc80613cb408

                      SHA512

                      7a72a77890aa74ea272473018a683f1b6961e5e765eb90e5be0bb397f04e58b09ab47cfb6095c2fea91f4e0d39bd65e21fee54a0eade36378878b7880bcb9d22

                    • C:\Users\Admin\AppData\Local\Temp\Files\bandwidth_monitor.exe

                      Filesize

                      2.1MB

                      MD5

                      19fce7cfdad7e67cd8b36d39bf80f648

                      SHA1

                      b36ba3a805b6a2b3fb8953cfaa8381eba1d07f99

                      SHA256

                      627738fdefc4ea61846d05ffd2ad413263d894a30bc7730fafdb595cf87358d8

                      SHA512

                      ce765fefa67465d25e8c91789cfee1c0a03cf59e2d5152627b5f17fc868fda9d56c2cea810dfc61e29379a327899f0b75ac41e3a762cccc1f1231598a6405dde

                    • C:\Users\Admin\AppData\Local\Temp\Files\ggg.exe

                      Filesize

                      7.5MB

                      MD5

                      50242f37a1fb1673af2619b7d8595dcd

                      SHA1

                      f9301a1b4a072a625ef2e898dfcbdbc8e6735c9f

                      SHA256

                      e82797a9b4a8fcc80f7a4521719d313119cc408b867b721a79f5967cdbac8a8c

                      SHA512

                      bb8622c9698e92723fab060ccbb022304e6d00601dadbc5d5e5d5a185a430fafad982c090a813a7a1424d4309cfd810fcd4eb382ef2afa7a8347820de19b2c15

                    • C:\Users\Admin\AppData\Local\Temp\Files\nefor.exe

                      Filesize

                      29.0MB

                      MD5

                      330709f05491b4e01ddf2af087d4e4f3

                      SHA1

                      0f94e0f3f7ef87df645847f84a94572192f5fc39

                      SHA256

                      3fa9bb2dffef3935ed2795dace89eec65270bd22a71e365ec1f55e0bf301fab5

                      SHA512

                      a6711690ff220954737edc2b4d67177ca546b5a63ab3aec9ed18bfc545c81b379b3ed15c30e2abaa0d7b1ed7fc2a975468b14fc9ee57419f596a285312771170

                    • C:\Users\Admin\AppData\Local\Temp\Files\ngown.exe

                      Filesize

                      1.1MB

                      MD5

                      f77f55496b53b40da142f51f87e986b2

                      SHA1

                      f246e98cc39a24359205ba64e4daeef03177197a

                      SHA256

                      d1beb2c11e992d1bd22f84355c25f7b01ea77cb1bfc26ca7c080ce2a68f05bc2

                      SHA512

                      1dd11dd92f4f03f4ba44a0e59c656c6af0870d34ced6f58a66ea5baf4eced635fd8e7eb63d15c9c97c228eec0f8575ffa965c59ac4f4e3a3fc2ba6f6ffc0252e

                    • C:\Users\Admin\AppData\Local\Temp\Files\pi.exe

                      Filesize

                      83KB

                      MD5

                      06560b5e92d704395bc6dae58bc7e794

                      SHA1

                      fbd3e4ae28620197d1f02bfc24adaf4ddacd2372

                      SHA256

                      9eaaadf3857e4a3e83f4f78d96ab185213b6528c8e470807f9d16035daadf33d

                      SHA512

                      b55b49fc1bd526c47d88fcf8a20fcaed900bfb291f2e3e1186ec196a87127ed24df71385ae04fedcc802c362c4ebf38edfc182013febf4496ddeb66ce5195ee3

                    • C:\Users\Admin\AppData\Local\Temp\Files\s.exe

                      Filesize

                      96KB

                      MD5

                      930c41bc0c20865af61a95bcf0c3b289

                      SHA1

                      cecf37c3b6c76d9a79dd2a97cfc518621a6ac924

                      SHA256

                      1f2e9724dfb091059ae16c305601e21d64b5308df76ddef6b394573e576ef1ff

                      SHA512

                      fa1f33c71da608b3980038981220fcebee0b0cc44331e52f5198dd2761c97631ee8286756c2cc16245a1370c83bb53cc8ea8ef64e0fcdd30af51f023973986b2

                    • C:\Users\Admin\AppData\Local\Temp\Files\splwow64.exe

                      Filesize

                      1.2MB

                      MD5

                      5d97c2475c8a4d52e140ef4650d1028b

                      SHA1

                      da20d0a43d6f8db44ff8212875a7e0f7bb223223

                      SHA256

                      f34dd7ec6030b1879d60faa8705fa1668adc210ddd52bcb2b0c2406606c5bccf

                      SHA512

                      22c684b21d0a9eb2eaa47329832e8ee64b003cfb3a9a5d8b719445a8532b18aad913f84025a27c95296ebeb34920fa62d64f28145ccfa3aa7d82ba95381924ee

                    • C:\Users\Admin\AppData\Local\Temp\Files\t1.exe

                      Filesize

                      84KB

                      MD5

                      a775d164cf76e9a9ff6afd7eb1e3ab2e

                      SHA1

                      0b390cd5a44a64296b592360b6b74ac66fb26026

                      SHA256

                      794ba0b949b2144057a1b68752d8fa324f1a211afc2231328be82d17f9308979

                      SHA512

                      80b2d105d2fac2e56b7ea9e1b56057e94ffe594c314ea96668d387ab120b24be580c58d68d37aca07273d3ce80f0d74f072102469f35cb02e2295817e1f16808

                    • C:\Users\Admin\AppData\Local\Temp\Files\vidar.exe

                      Filesize

                      383KB

                      MD5

                      1e1d5412616216fd90ea3cb6a87353db

                      SHA1

                      da0ae99aebbde6433c8dc985e8c8b2305cdb9b54

                      SHA256

                      765eb00651ebf6ddbc9c8d6e687292dae89f0d8260cea08505020992835208d8

                      SHA512

                      fcffb031004aa683656cd2d8ada0703255dd6fd01bf7e2b811e919ee33d4dff9b80ca6f17f44436c2a10d6bafa0abc4fb6c5f3151f167524293302841b00fbe3

                    • C:\Users\Admin\AppData\Local\Temp\Fitting

                      Filesize

                      62KB

                      MD5

                      46a51002cdbe912d860ce08c83c0376b

                      SHA1

                      6d0ae63850bd8d5c86e45cba938609a7f051f59b

                      SHA256

                      18070c4700df6609e096f2e79f353844e3e98c9aacca69919a8baeb9f9890017

                      SHA512

                      ed7c8d09e305687dc687ab23f6a83692232677c120836c8f4b876c4dfa867b47e29684e7e1c7973f6c29eeed1b8530b96f609a6111dde36d94f6657c9b5a4e44

                    • C:\Users\Admin\AppData\Local\Temp\Molecular

                      Filesize

                      69KB

                      MD5

                      8ca4bbb4e4ddf045ff547cb2d438615c

                      SHA1

                      3e2fc0fdc0359a08c7782f44a5ccebf3a52b5152

                      SHA256

                      4e4bb4aa1f996e96db8e18e4f2a6576673c00b76126f846ba821b4cd3998afed

                      SHA512

                      b45ed05fa6d846c0a38cefcd5d256fdee997b9010bc249a34d830953100ca779ab88547353cc8badaf2908f59ff3a8c780f7cac189c0f549246feb504ecb5af9

                    • C:\Users\Admin\AppData\Local\Temp\Mtv

                      Filesize

                      7KB

                      MD5

                      f3d7abb7a7c91203886dd0f2df4fc0d6

                      SHA1

                      60ffbb095fceeb2ea2b9e65355e9dbf1de736d6c

                      SHA256

                      5867350b8ad8bb5d83111aed8b296b8c28328ba72b5bedb0cbeb99b3dc600cb3

                      SHA512

                      9af80787c63fa7de9a22eea3d1f13d25ff1558ed95321a8178da734dce5126f0b7322f13cddd40c1bc67b65140f684a190dd117247f06600a07db97b015aa367

                    • C:\Users\Admin\AppData\Local\Temp\See

                      Filesize

                      58KB

                      MD5

                      84c831b7996dfc78c7e4902ad97e8179

                      SHA1

                      739c580a19561b6cde4432a002a502bea9f32754

                      SHA256

                      1ac7db51182a2fc38e7831a67d3ff4e08911e4fca81a9f2aa0b7c7e393cc2575

                      SHA512

                      ae8e53499535938352660db161c768482438f5f6f5afb632ce7ae2e28d9c547fcf4ed939dd136e17c05ed14711368bdd6f3d4ae2e3f0d78a21790b0955745991

                    • C:\Users\Admin\AppData\Local\Temp\Spirit

                      Filesize

                      80KB

                      MD5

                      0814e2558c8e63169d393fac20c668f9

                      SHA1

                      52e8b77554cc098410408668e3d4f127fa02d8bd

                      SHA256

                      cfdc18b19fe2c0f099fd9f733fe4494aa25b2828d735c226d06c654694fcf96d

                      SHA512

                      80e70a6eb57df698fe85d4599645c71678a76340380d880e108b391c922adadf42721df5aa994fcfb293ab90e7b04ff3d595736354b93fcb6b5111e90b475319

                    • C:\Users\Admin\AppData\Local\Temp\Sponsorship

                      Filesize

                      71KB

                      MD5

                      6785e2e985143a33c5c3557788f12a2b

                      SHA1

                      7a86e94bc7bc10bd8dd54ade696e10a0ae5b4bf0

                      SHA256

                      66bbe1741f98dbb750aa82a19bc7b5dc1cdbecf31f0d9ddb03ff7cf489f318c7

                      SHA512

                      3edad611d150c99dbb24a169967cc31e1d3942c3f77b3af2de621a6912356400c8003b1c99a7236b6bed65bd136d683414e96c698eabd33d66d7ab231cdfee91

                    • C:\Users\Admin\AppData\Local\Temp\Sweet

                      Filesize

                      865KB

                      MD5

                      6cee6bd1b0b8230a1c792a0e8f72f7eb

                      SHA1

                      66a7d26ed56924f31e681c1af47d6978d1d6e4e8

                      SHA256

                      08ac328ad30dfc0715f8692b9290d7ac55ce93755c9aca17f1b787b6e96667ab

                      SHA512

                      4d78417accf1378194e4f58d552a1ea324747bdec41b3c59a6784ee767f863853eebafe2f2bc6315549bddc4d7dc7ce42c42ff7f383b96ae400cac8cf4c64193

                    • C:\Users\Admin\AppData\Local\Temp\Twisted

                      Filesize

                      95KB

                      MD5

                      ba8c4239470d59c50a35a25b7950187f

                      SHA1

                      855a8f85182dd03f79787147b73ae5ed61fb8d7b

                      SHA256

                      a6272116dc959a3197a969923f85c000a1388b0a02df633dec59b7273bdb421b

                      SHA512

                      1e6d42c249d206815000cc85d5216d13729246e114647d8ccf174b9bd679530b6b39dfab2bfcc5d957cc0778a8cf029e544228978682fa285c5e3f9564c2eaf0

                    • C:\Users\Admin\AppData\Local\Temp\Various

                      Filesize

                      92KB

                      MD5

                      2759c67bccd900a1689d627f38f0a635

                      SHA1

                      d71b170715ed2b304167545af2bd42834ccf1881

                      SHA256

                      510cfd9523a0f8462e8cbdcbbf1afccf2aa69a9153472ee48fd28ad4fe06ca05

                      SHA512

                      aa9e26ad8824ed2ca8bf45c24939e305660cbc19f821a84a7407a16f91d71b2eb9daba9059d379908f17c9e5a17c0c3e873e5cd7350ee8715e45b2b3eff2531e

                    • C:\Users\Admin\AppData\Local\Temp\Witch

                      Filesize

                      53KB

                      MD5

                      79156afddd310be36f037a8f0708a794

                      SHA1

                      09ef36ae22b5eab65d1f62166542601b8919399d

                      SHA256

                      7faaf10d09a27842330725e6510d2754487c5b69bd40e11181dd75b03df61503

                      SHA512

                      d1449126f2365f607a390e3b6fecb3be100bff9fae1a773cf5815cab29eeb72ab4e341022bde9de653fd62ede0fb0c26d9010e524d87060aa364bf92a14e9d01

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\VCRUNTIME140.dll

                      Filesize

                      116KB

                      MD5

                      be8dbe2dc77ebe7f88f910c61aec691a

                      SHA1

                      a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                      SHA256

                      4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                      SHA512

                      0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-console-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      e8b9d74bfd1f6d1cc1d99b24f44da796

                      SHA1

                      a312cfc6a7ed7bf1b786e5b3fd842a7eeb683452

                      SHA256

                      b1b3fd40ab437a43c8db4994ccffc7f88000cc8bb6e34a2bcbff8e2464930c59

                      SHA512

                      b74d9b12b69db81a96fc5a001fd88c1e62ee8299ba435e242c5cb2ce446740ed3d8a623e1924c2bc07bfd9aef7b2577c9ec8264e53e5be625f4379119bafcc27

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-datetime-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      cfe0c1dfde224ea5fed9bd5ff778a6e0

                      SHA1

                      5150e7edd1293e29d2e4d6bb68067374b8a07ce6

                      SHA256

                      0d0f80cbf476af5b1c9fd3775e086ed0dfdb510cd0cc208ec1ccb04572396e3e

                      SHA512

                      b0e02e1f19cfa7de3693d4d63e404bdb9d15527ac85a6d492db1128bb695bffd11bec33d32f317a7615cb9a820cd14f9f8b182469d65af2430ffcdbad4bd7000

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-debug-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      33bbece432f8da57f17bf2e396ebaa58

                      SHA1

                      890df2dddfdf3eeccc698312d32407f3e2ec7eb1

                      SHA256

                      7cf0944901f7f7e0d0b9ad62753fc2fe380461b1cce8cdc7e9c9867c980e3b0e

                      SHA512

                      619b684e83546d97fc1d1bc7181ad09c083e880629726ee3af138a9e4791a6dcf675a8df65dc20edbe6465b5f4eac92a64265df37e53a5f34f6be93a5c2a7ae5

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-errorhandling-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      eb0978a9213e7f6fdd63b2967f02d999

                      SHA1

                      9833f4134f7ac4766991c918aece900acfbf969f

                      SHA256

                      ab25a1fe836fc68bcb199f1fe565c27d26af0c390a38da158e0d8815efe1103e

                      SHA512

                      6f268148f959693ee213db7d3db136b8e3ad1f80267d8cbd7d5429c021adaccc9c14424c09d527e181b9c9b5ea41765aff568b9630e4eb83bfc532e56dfe5b63

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-file-l1-1-0.dll

                      Filesize

                      25KB

                      MD5

                      efad0ee0136532e8e8402770a64c71f9

                      SHA1

                      cda3774fe9781400792d8605869f4e6b08153e55

                      SHA256

                      3d2c55902385381869db850b526261ddeb4628b83e690a32b67d2e0936b2c6ed

                      SHA512

                      69d25edf0f4c8ac5d77cb5815dfb53eac7f403dc8d11bfe336a545c19a19ffde1031fa59019507d119e4570da0d79b95351eac697f46024b4e558a0ff6349852

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-file-l1-2-0.dll

                      Filesize

                      21KB

                      MD5

                      1c58526d681efe507deb8f1935c75487

                      SHA1

                      0e6d328faf3563f2aae029bc5f2272fb7a742672

                      SHA256

                      ef13dce8f71173315dfc64ab839b033ab19a968ee15230e9d4d2c9d558efeee2

                      SHA512

                      8edb9a0022f417648e2ece9e22c96e2727976332025c3e7d8f15bcf6d7d97e680d1bf008eb28e2e0bd57787dcbb71d38b2deb995b8edc35fa6852ab1d593f3d1

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-file-l2-1-0.dll

                      Filesize

                      18KB

                      MD5

                      bfffa7117fd9b1622c66d949bac3f1d7

                      SHA1

                      402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2

                      SHA256

                      1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e

                      SHA512

                      b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-handle-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      e89cdcd4d95cda04e4abba8193a5b492

                      SHA1

                      5c0aee81f32d7f9ec9f0650239ee58880c9b0337

                      SHA256

                      1a489e0606484bd71a0d9cb37a1dc6ca8437777b3d67bfc8c0075d0cc59e6238

                      SHA512

                      55d01e68c8c899e99a3c62c2c36d6bcb1a66ff6ecd2636d2d0157409a1f53a84ce5d6f0c703d5ed47f8e9e2d1c9d2d87cc52585ee624a23d92183062c999b97e

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-heap-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      accc640d1b06fb8552fe02f823126ff5

                      SHA1

                      82ccc763d62660bfa8b8a09e566120d469f6ab67

                      SHA256

                      332ba469ae84aa72ec8cce2b33781db1ab81a42ece5863f7a3cb5a990059594f

                      SHA512

                      6382302fb7158fc9f2be790811e5c459c5c441f8caee63df1e09b203b8077a27e023c4c01957b252ac8ac288f8310bcee5b4dcc1f7fc691458b90cdfaa36dcbe

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-interlocked-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      c6024cc04201312f7688a021d25b056d

                      SHA1

                      48a1d01ae8bc90f889fb5f09c0d2a0602ee4b0fd

                      SHA256

                      8751d30df554af08ef42d2faa0a71abcf8c7d17ce9e9ff2ea68a4662603ec500

                      SHA512

                      d86c773416b332945acbb95cbe90e16730ef8e16b7f3ccd459d7131485760c2f07e95951aeb47c1cf29de76affeb1c21bdf6d8260845e32205fe8411ed5efa47

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-libraryloader-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      1f2a00e72bc8fa2bd887bdb651ed6de5

                      SHA1

                      04d92e41ce002251cc09c297cf2b38c4263709ea

                      SHA256

                      9c8a08a7d40b6f697a21054770f1afa9ffb197f90ef1eee77c67751df28b7142

                      SHA512

                      8cf72df019f9fc9cd22ff77c37a563652becee0708ff5c6f1da87317f41037909e64dcbdcc43e890c5777e6bcfa4035a27afc1aeeb0f5deba878e3e9aef7b02a

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-localization-l1-2-0.dll

                      Filesize

                      21KB

                      MD5

                      724223109e49cb01d61d63a8be926b8f

                      SHA1

                      072a4d01e01dbbab7281d9bd3add76f9a3c8b23b

                      SHA256

                      4e975f618df01a492ae433dff0dd713774d47568e44c377ceef9e5b34aad1210

                      SHA512

                      19b0065b894dc66c30a602c9464f118e7f84d83010e74457d48e93aaca4422812b093b15247b24d5c398b42ef0319108700543d13f156067b169ccfb4d7b6b7c

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-memory-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      3c38aac78b7ce7f94f4916372800e242

                      SHA1

                      c793186bcf8fdb55a1b74568102b4e073f6971d6

                      SHA256

                      3f81a149ba3862776af307d5c7feef978f258196f0a1bf909da2d3f440ff954d

                      SHA512

                      c2746aa4342c6afffbd174819440e1bbf4371a7fed29738801c75b49e2f4f94fd6d013e002bad2aadafbc477171b8332c8c5579d624684ef1afbfde9384b8588

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-namedpipe-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      321a3ca50e80795018d55a19bf799197

                      SHA1

                      df2d3c95fb4cbb298d255d342f204121d9d7ef7f

                      SHA256

                      5476db3a4fecf532f96d48f9802c966fdef98ec8d89978a79540cb4db352c15f

                      SHA512

                      3ec20e1ac39a98cb5f726d8390c2ee3cd4cd0bf118fdda7271f7604a4946d78778713b675d19dd3e1ec1d6d4d097abe9cd6d0f76b3a7dff53ce8d6dbc146870a

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-processenvironment-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      0462e22f779295446cd0b63e61142ca5

                      SHA1

                      616a325cd5b0971821571b880907ce1b181126ae

                      SHA256

                      0b6b598ec28a9e3d646f2bb37e1a57a3dda069a55fba86333727719585b1886e

                      SHA512

                      07b34dca6b3078f7d1e8ede5c639f697c71210dcf9f05212fd16eb181ab4ac62286bc4a7ce0d84832c17f5916d0224d1e8aab210ceeff811fc6724c8845a74fe

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-processthreads-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      c3632083b312c184cbdd96551fed5519

                      SHA1

                      a93e8e0af42a144009727d2decb337f963a9312e

                      SHA256

                      be8d78978d81555554786e08ce474f6af1de96fcb7fa2f1ce4052bc80c6b2125

                      SHA512

                      8807c2444a044a3c02ef98cf56013285f07c4a1f7014200a21e20fcb995178ba835c30ac3889311e66bc61641d6226b1ff96331b019c83b6fcc7c87870cce8c4

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-processthreads-l1-1-1.dll

                      Filesize

                      21KB

                      MD5

                      517eb9e2cb671ae49f99173d7f7ce43f

                      SHA1

                      4ccf38fed56166ddbf0b7efb4f5314c1f7d3b7ab

                      SHA256

                      57cc66bf0909c430364d35d92b64eb8b6a15dc201765403725fe323f39e8ac54

                      SHA512

                      492be2445b10f6bfe6c561c1fc6f5d1af6d1365b7449bc57a8f073b44ae49c88e66841f5c258b041547fcd33cbdcb4eb9dd3e24f0924db32720e51651e9286be

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-profile-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      f3ff2d544f5cd9e66bfb8d170b661673

                      SHA1

                      9e18107cfcd89f1bbb7fdaf65234c1dc8e614add

                      SHA256

                      e1c5d8984a674925fa4afbfe58228be5323fe5123abcd17ec4160295875a625f

                      SHA512

                      184b09c77d079127580ef80eb34bded0f5e874cefbe1c5f851d86861e38967b995d859e8491fcc87508930dc06c6bbf02b649b3b489a1b138c51a7d4b4e7aaad

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-rtlsupport-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      a0c2dbe0f5e18d1add0d1ba22580893b

                      SHA1

                      29624df37151905467a223486500ed75617a1dfd

                      SHA256

                      3c29730df2b28985a30d9c82092a1faa0ceb7ffc1bd857d1ef6324cf5524802f

                      SHA512

                      3e627f111196009380d1687e024e6ffb1c0dcf4dcb27f8940f17fec7efdd8152ff365b43cb7fdb31de300955d6c15e40a2c8fb6650a91706d7ea1c5d89319b12

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-string-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      2666581584ba60d48716420a6080abda

                      SHA1

                      c103f0ea32ebbc50f4c494bce7595f2b721cb5ad

                      SHA256

                      27e9d3e7c8756e4512932d674a738bf4c2969f834d65b2b79c342a22f662f328

                      SHA512

                      befed15f11a0550d2859094cc15526b791dadea12c2e7ceb35916983fb7a100d89d638fb1704975464302fae1e1a37f36e01e4bef5bc4924ab8f3fd41e60bd0c

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-synch-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      225d9f80f669ce452ca35e47af94893f

                      SHA1

                      37bd0ffc8e820247bd4db1c36c3b9f9f686bbd50

                      SHA256

                      61c0ebe60ce6ebabcb927ddff837a9bf17e14cd4b4c762ab709e630576ec7232

                      SHA512

                      2f71a3471a9868f4d026c01e4258aff7192872590f5e5c66aabd3c088644d28629ba8835f3a4a23825631004b1afd440efe7161bb9fc7d7c69e0ee204813ca7b

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-synch-l1-2-0.dll

                      Filesize

                      21KB

                      MD5

                      1281e9d1750431d2fe3b480a8175d45c

                      SHA1

                      bc982d1c750b88dcb4410739e057a86ff02d07ef

                      SHA256

                      433bd8ddc4f79aee65ca94a54286d75e7d92b019853a883e51c2b938d2469baa

                      SHA512

                      a954e6ce76f1375a8beac51d751b575bbc0b0b8ba6aa793402b26404e45718165199c2c00ccbcba3783c16bdd96f0b2c17addcc619c39c8031becebef428ce77

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-sysinfo-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      fd46c3f6361e79b8616f56b22d935a53

                      SHA1

                      107f488ad966633579d8ec5eb1919541f07532ce

                      SHA256

                      0dc92e8830bc84337dcae19ef03a84ef5279cf7d4fdc2442c1bc25320369f9df

                      SHA512

                      3360b2e2a25d545ccd969f305c4668c6cda443bbdbd8a8356ffe9fbc2f70d90cf4540f2f28c9ed3eea6c9074f94e69746e7705e6254827e6a4f158a75d81065b

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-timezone-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      d12403ee11359259ba2b0706e5e5111c

                      SHA1

                      03cc7827a30fd1dee38665c0cc993b4b533ac138

                      SHA256

                      f60e1751a6ac41f08e46480bf8e6521b41e2e427803996b32bdc5e78e9560781

                      SHA512

                      9004f4e59835af57f02e8d9625814db56f0e4a98467041da6f1367ef32366ad96e0338d48fff7cc65839a24148e2d9989883bcddc329d9f4d27cae3f843117d0

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-core-util-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      0f129611a4f1e7752f3671c9aa6ea736

                      SHA1

                      40c07a94045b17dae8a02c1d2b49301fad231152

                      SHA256

                      2e1f090aba941b9d2d503e4cd735c958df7bb68f1e9bdc3f47692e1571aaac2f

                      SHA512

                      6abc0f4878bb302713755a188f662c6fe162ea6267e5e1c497c9ba9fddbdaea4db050e322cb1c77d6638ecf1dad940b9ebc92c43acaa594040ee58d313cbcfae

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-crt-conio-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      d4fba5a92d68916ec17104e09d1d9d12

                      SHA1

                      247dbc625b72ffb0bf546b17fb4de10cad38d495

                      SHA256

                      93619259328a264287aee7c5b88f7f0ee32425d7323ce5dc5a2ef4fe3bed90d5

                      SHA512

                      d5a535f881c09f37e0adf3b58d41e123f527d081a1ebecd9a927664582ae268341771728dc967c30908e502b49f6f853eeaebb56580b947a629edc6bce2340d8

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-crt-convert-l1-1-0.dll

                      Filesize

                      25KB

                      MD5

                      edf71c5c232f5f6ef3849450f2100b54

                      SHA1

                      ed46da7d59811b566dd438fa1d09c20f5dc493ce

                      SHA256

                      b987ab40cdd950ebe7a9a9176b80b8fffc005ccd370bb1cbbcad078c1a506bdc

                      SHA512

                      481a3c8dc5bef793ee78ce85ec0f193e3e9f6cd57868b813965b312bd0fadeb5f4419707cd3004fbdb407652101d52e061ef84317e8bd458979443e9f8e4079a

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-crt-environment-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      f9235935dd3ba2aa66d3aa3412accfbf

                      SHA1

                      281e548b526411bcb3813eb98462f48ffaf4b3eb

                      SHA256

                      2f6bd6c235e044755d5707bd560a6afc0ba712437530f76d11079d67c0cf3200

                      SHA512

                      ad0c0a7891fb8328f6f0cf1ddc97523a317d727c15d15498afa53c07610210d2610db4bc9bd25958d47adc1af829ad4d7cf8aabcab3625c783177ccdb7714246

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-crt-filesystem-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      5107487b726bdcc7b9f7e4c2ff7f907c

                      SHA1

                      ebc46221d3c81a409fab9815c4215ad5da62449c

                      SHA256

                      94a86e28e829276974e01f8a15787fde6ed699c8b9dc26f16a51765c86c3eade

                      SHA512

                      a0009b80ad6a928580f2b476c1bdf4352b0611bb3a180418f2a42cfa7a03b9f0575ed75ec855d30b26e0cca96a6da8affb54862b6b9aff33710d2f3129283faa

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\api-ms-win-crt-heap-l1-1-0.dll

                      Filesize

                      21KB

                      MD5

                      d5d77669bd8d382ec474be0608afd03f

                      SHA1

                      1558f5a0f5facc79d3957ff1e72a608766e11a64

                      SHA256

                      8dd9218998b4c4c9e8d8b0f8b9611d49419b3c80daa2f437cbf15bcfd4c0b3b8

                      SHA512

                      8defa71772105fd9128a669f6ff19b6fe47745a0305beb9a8cadb672ed087077f7538cd56e39329f7daa37797a96469eae7cd5e4cca57c9a183b35bdc44182f3

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\base_library.zip

                      Filesize

                      1.3MB

                      MD5

                      48ba559bf70c3ef963f86633530667d6

                      SHA1

                      e3319e3a70590767ad00290230d77158f8f8307e

                      SHA256

                      f8377aa03b7036e7735e2814452c1759ab7ceec3f8f8a202b697b4132809ce5e

                      SHA512

                      567a7bef4a7c7ff0890708c0e62d2af748b645c8b9071953873b0dd5aa789c42796860896a6b5e539651de9a2243338e2a5fb47743c30dfcde59b1787c4c1871

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\python312.dll

                      Filesize

                      6.6MB

                      MD5

                      cae8fa4e7cb32da83acf655c2c39d9e1

                      SHA1

                      7a0055588a2d232be8c56791642cb0f5abbc71f8

                      SHA256

                      8ad53c67c2b4db4387d5f72ee2a3ca80c40af444b22bf41a6cfda2225a27bb93

                      SHA512

                      db2190da2c35bceed0ef91d7553ff0dea442286490145c3d0e89db59ba1299b0851e601cc324b5f7fd026414fc73755e8eff2ef5fb5eeb1c54a9e13e7c66dd0c

                    • C:\Users\Admin\AppData\Local\Temp\_MEI28762\ucrtbase.dll

                      Filesize

                      992KB

                      MD5

                      0e0bac3d1dcc1833eae4e3e4cf83c4ef

                      SHA1

                      4189f4459c54e69c6d3155a82524bda7549a75a6

                      SHA256

                      8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

                      SHA512

                      a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wzebhppf.kzx.ps1

                      Filesize

                      60B

                      MD5

                      d17fe0a3f47be24a6453e9ef58c94641

                      SHA1

                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                      SHA256

                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                      SHA512

                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                    • memory/364-790-0x00007FF6CF9E0000-0x00007FF6CFA4C000-memory.dmp

                      Filesize

                      432KB

                    • memory/1172-982-0x0000000000390000-0x0000000000606000-memory.dmp

                      Filesize

                      2.5MB

                    • memory/1172-792-0x0000000025630000-0x000000002588F000-memory.dmp

                      Filesize

                      2.4MB

                    • memory/1172-682-0x0000000000390000-0x0000000000606000-memory.dmp

                      Filesize

                      2.5MB

                    • memory/2164-1026-0x000000006EC30000-0x000000006EC7C000-memory.dmp

                      Filesize

                      304KB

                    • memory/2164-1047-0x00000000071D0000-0x00000000071E4000-memory.dmp

                      Filesize

                      80KB

                    • memory/2164-1020-0x0000000005550000-0x00000000058A4000-memory.dmp

                      Filesize

                      3.3MB

                    • memory/2164-1025-0x0000000005D00000-0x0000000005D4C000-memory.dmp

                      Filesize

                      304KB

                    • memory/2164-1036-0x0000000006E50000-0x0000000006EF3000-memory.dmp

                      Filesize

                      652KB

                    • memory/2164-1037-0x0000000007190000-0x00000000071A1000-memory.dmp

                      Filesize

                      68KB

                    • memory/2340-1059-0x00007FF716370000-0x00007FF716B5F000-memory.dmp

                      Filesize

                      7.9MB

                    • memory/2388-655-0x0000000003A70000-0x0000000003AE3000-memory.dmp

                      Filesize

                      460KB

                    • memory/2388-649-0x0000000003A70000-0x0000000003AE3000-memory.dmp

                      Filesize

                      460KB

                    • memory/2388-652-0x0000000003A70000-0x0000000003AE3000-memory.dmp

                      Filesize

                      460KB

                    • memory/2388-650-0x0000000003A70000-0x0000000003AE3000-memory.dmp

                      Filesize

                      460KB

                    • memory/2388-651-0x0000000003A70000-0x0000000003AE3000-memory.dmp

                      Filesize

                      460KB

                    • memory/2388-654-0x0000000003A70000-0x0000000003AE3000-memory.dmp

                      Filesize

                      460KB

                    • memory/2388-653-0x0000000003A70000-0x0000000003AE3000-memory.dmp

                      Filesize

                      460KB

                    • memory/2404-923-0x00007FF6F5D00000-0x00007FF6F6297000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/2564-1052-0x00007FF604280000-0x00007FF604817000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/2876-699-0x00007FF6CF9E0000-0x00007FF6CFA4C000-memory.dmp

                      Filesize

                      432KB

                    • memory/2876-791-0x00007FF6CF9E0000-0x00007FF6CFA4C000-memory.dmp

                      Filesize

                      432KB

                    • memory/2968-985-0x00007FF68B600000-0x00007FF68B629000-memory.dmp

                      Filesize

                      164KB

                    • memory/2968-1010-0x00007FF68B600000-0x00007FF68B629000-memory.dmp

                      Filesize

                      164KB

                    • memory/2968-1058-0x00007FF68B600000-0x00007FF68B629000-memory.dmp

                      Filesize

                      164KB

                    • memory/3240-910-0x0000020266AC0000-0x0000020266AE2000-memory.dmp

                      Filesize

                      136KB

                    • memory/4072-952-0x00007FF604280000-0x00007FF604817000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/4084-954-0x00007FF63CEF0000-0x00007FF63D6DF000-memory.dmp

                      Filesize

                      7.9MB

                    • memory/4084-953-0x0000024C4FF30000-0x0000024C4FF50000-memory.dmp

                      Filesize

                      128KB

                    • memory/4676-848-0x0000000000660000-0x0000000000666000-memory.dmp

                      Filesize

                      24KB

                    • memory/4800-0-0x00000000745FE000-0x00000000745FF000-memory.dmp

                      Filesize

                      4KB

                    • memory/4800-627-0x00000000745F0000-0x0000000074DA0000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/4800-591-0x00000000745FE000-0x00000000745FF000-memory.dmp

                      Filesize

                      4KB

                    • memory/4800-3-0x00000000745F0000-0x0000000074DA0000-memory.dmp

                      Filesize

                      7.7MB

                    • memory/4800-2-0x0000000004A50000-0x0000000004AEC000-memory.dmp

                      Filesize

                      624KB

                    • memory/4800-1-0x00000000001A0000-0x00000000001A8000-memory.dmp

                      Filesize

                      32KB

                    • memory/4876-832-0x0000000000400000-0x0000000000440000-memory.dmp

                      Filesize

                      256KB

                    • memory/4876-833-0x00000000059F0000-0x0000000005F94000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/4876-834-0x0000000006350000-0x00000000063A0000-memory.dmp

                      Filesize

                      320KB

                    • memory/4876-835-0x0000000006440000-0x00000000064D2000-memory.dmp

                      Filesize

                      584KB

                    • memory/4876-836-0x00000000063E0000-0x00000000063EA000-memory.dmp

                      Filesize

                      40KB

                    • memory/5024-965-0x0000000006060000-0x00000000060AC000-memory.dmp

                      Filesize

                      304KB

                    • memory/5024-964-0x0000000005B20000-0x0000000005E74000-memory.dmp

                      Filesize

                      3.3MB

                    • memory/5024-978-0x0000000007540000-0x0000000007554000-memory.dmp

                      Filesize

                      80KB

                    • memory/5024-977-0x0000000007500000-0x0000000007511000-memory.dmp

                      Filesize

                      68KB

                    • memory/5024-976-0x0000000007200000-0x00000000072A3000-memory.dmp

                      Filesize

                      652KB

                    • memory/5024-966-0x000000006E1C0000-0x000000006E20C000-memory.dmp

                      Filesize

                      304KB

                    • memory/5044-513-0x0000000005EE0000-0x0000000005F2C000-memory.dmp

                      Filesize

                      304KB

                    • memory/5044-539-0x0000000006EB0000-0x0000000006F53000-memory.dmp

                      Filesize

                      652KB

                    • memory/5044-512-0x0000000005EC0000-0x0000000005EDE000-memory.dmp

                      Filesize

                      120KB

                    • memory/5044-494-0x00000000056B0000-0x0000000005716000-memory.dmp

                      Filesize

                      408KB

                    • memory/5044-493-0x0000000004FA0000-0x0000000005006000-memory.dmp

                      Filesize

                      408KB

                    • memory/5044-492-0x0000000004F00000-0x0000000004F22000-memory.dmp

                      Filesize

                      136KB

                    • memory/5044-490-0x00000000028D0000-0x0000000002906000-memory.dmp

                      Filesize

                      216KB

                    • memory/5044-491-0x0000000005080000-0x00000000056A8000-memory.dmp

                      Filesize

                      6.2MB

                    • memory/5044-523-0x000000006F020000-0x000000006F06C000-memory.dmp

                      Filesize

                      304KB

                    • memory/5044-522-0x0000000006E70000-0x0000000006EA2000-memory.dmp

                      Filesize

                      200KB

                    • memory/5044-535-0x0000000006490000-0x00000000064AE000-memory.dmp

                      Filesize

                      120KB

                    • memory/5044-504-0x0000000005860000-0x0000000005BB4000-memory.dmp

                      Filesize

                      3.3MB

                    • memory/5044-552-0x0000000007890000-0x0000000007F0A000-memory.dmp

                      Filesize

                      6.5MB

                    • memory/5044-553-0x00000000071E0000-0x00000000071FA000-memory.dmp

                      Filesize

                      104KB

                    • memory/5044-607-0x0000000007250000-0x000000000725A000-memory.dmp

                      Filesize

                      40KB

                    • memory/5044-619-0x0000000007460000-0x00000000074F6000-memory.dmp

                      Filesize

                      600KB

                    • memory/5044-624-0x0000000007400000-0x0000000007411000-memory.dmp

                      Filesize

                      68KB

                    • memory/5044-628-0x0000000007420000-0x000000000742E000-memory.dmp

                      Filesize

                      56KB

                    • memory/5044-629-0x0000000007430000-0x0000000007444000-memory.dmp

                      Filesize

                      80KB

                    • memory/5044-630-0x0000000007520000-0x000000000753A000-memory.dmp

                      Filesize

                      104KB

                    • memory/5044-631-0x0000000007500000-0x0000000007508000-memory.dmp

                      Filesize

                      32KB