Resubmissions

30-11-2024 01:23

241130-brr24awjcs 10

30-11-2024 01:22

241130-brh47azpcm 3

15-11-2024 19:13

241115-xxjtkayqgz 10

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-11-2024 19:13

General

  • Target

    4363463463464363463463463.exe

  • Size

    10KB

  • MD5

    2a94f3960c58c6e70826495f76d00b85

  • SHA1

    e2a1a5641295f5ebf01a37ac1c170ac0814bb71a

  • SHA256

    2fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce

  • SHA512

    fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f

  • SSDEEP

    192:xlwayyHOXGc20L7BIW12n/ePSjiTlzkGu8stYcFwVc03KY:xlwwHe/20PKn/cLTlHuptYcFwVc03K

Malware Config

Extracted

Family

stealc

Botnet

default2

C2

http://185.215.113.17

Attributes
  • url_path

    /2fb6c2cc8dce150a.php

Extracted

Family

phorphiex

C2

http://185.215.113.66/

http://91.202.233.141/

Wallets

0xCa90599132C4D88907Bd8E046540284aa468a035

TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6

qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r

XryzFMFVpDUvU7famUGf214EXD3xNUSmQf

rsXCXBf9SagxV8JfC12d8Bybk84oPdMNN9

AULzfBuUAPfCGAXoG5Vq14aP9s6fx3AH4Z

LdgchXq1sKbAaAJ1EXAPSRBzLb8jnTZstT

MP8GEm8QpYgQYaMo8oM5NQhRBgDGiLZW5Q

4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK

15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC

1BzmrjmKPKSR2hH5BeJySfiVA676E8DYaK

ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp

3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc

3ESHude8zUHksQg1h6hHmzY79BS36L91Yn

DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA

t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh

stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj

bnb1msyt0djx4ecspfxg5en0ye465kg3kmv9utzml2

bc1ppypcmu3684n648gyj62gjp2rw0xy7w3vwfamatlg29ajp4z52desafa0sr

bc1qc9edl4hzl9jyt8twdad3zjeh2df2znq96tdezd

Attributes
  • mutex

    753f85d83d

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36

Extracted

Family

redline

Botnet

Diamotrix

C2

176.111.174.140:1912

Extracted

Family

redline

Botnet

TG CLOUD @RLREBORN Admin @FATHEROFCARDERS

C2

89.105.223.196:29862

Extracted

Family

amadey

Version

5.04

Botnet

4bee07

C2

http://185.215.113.209

Attributes
  • install_dir

    fc9e0aaab7

  • install_file

    defnur.exe

  • strings_key

    191655f008adc880f91bfc85bc56db54

  • url_paths

    /Fru7Nk9/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Modifies security service 2 TTPs 1 IoCs
  • Phorphiex family
  • Phorphiex payload 2 IoCs
  • Phorphiex, Phorpiex

    Phorphiex or Phorpiex Malware family which infects systems to distribute other malicious payloads such as ransomware, stealers and cryptominers.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • Redline family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
  • Windows security bypass 2 TTPs 6 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 32 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 12 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 7 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 64 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 9 IoCs
  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 29 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: SetClipboardViewer 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 22 IoCs
  • Suspicious use of SendNotifyMessage 22 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3488
    • C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe
      "C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1804
      • C:\Users\Admin\AppData\Local\Temp\Files\Setup.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\Setup.exe"
        3⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4852
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          4⤵
          • Drops file in Drivers directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4876
      • C:\Users\Admin\AppData\Local\Temp\Files\nc64.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\nc64.exe"
        3⤵
        • Executes dropped EXE
        PID:4008
      • C:\Users\Admin\AppData\Local\Temp\Files\ConsoleApp3.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\ConsoleApp3.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4600
      • C:\Users\Admin\AppData\Local\Temp\Files\3544436.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\3544436.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4536
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1180
      • C:\Users\Admin\AppData\Local\Temp\Files\stealc_daval.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\stealc_daval.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        PID:4520
      • C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe
        "C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:448
        • C:\Windows\sysnldcvmr.exe
          C:\Windows\sysnldcvmr.exe
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4380
          • C:\Users\Admin\AppData\Local\Temp\3169315377.exe
            C:\Users\Admin\AppData\Local\Temp\3169315377.exe
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            PID:3016
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
              6⤵
                PID:5580
                • C:\Windows\system32\reg.exe
                  reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
                  7⤵
                    PID:5760
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"
                  6⤵
                    PID:5624
                    • C:\Windows\system32\schtasks.exe
                      schtasks /delete /f /tn "Windows Upgrade Manager"
                      7⤵
                        PID:5696
                  • C:\Users\Admin\AppData\Local\Temp\238543224.exe
                    C:\Users\Admin\AppData\Local\Temp\238543224.exe
                    5⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:4772
                  • C:\Users\Admin\AppData\Local\Temp\2159924350.exe
                    C:\Users\Admin\AppData\Local\Temp\2159924350.exe
                    5⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:6128
                    • C:\Users\Admin\AppData\Local\Temp\1907914307.exe
                      C:\Users\Admin\AppData\Local\Temp\1907914307.exe
                      6⤵
                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                      • Executes dropped EXE
                      PID:5272
                  • C:\Users\Admin\AppData\Local\Temp\301212194.exe
                    C:\Users\Admin\AppData\Local\Temp\301212194.exe
                    5⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    PID:5532
              • C:\Users\Admin\AppData\Local\Temp\Files\Installeraus.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\Installeraus.exe"
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:5964
                • C:\Users\Admin\AppData\Roaming\MSIX\meshagent32-group.exe
                  "C:\Users\Admin\AppData\Roaming\MSIX\meshagent32-group.exe" -fullinstall
                  4⤵
                  • Sets service image path in registry
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • System Location Discovery: System Language Discovery
                  PID:5336
              • C:\Users\Admin\AppData\Local\Temp\Files\ggg.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\ggg.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:5344
                • C:\Users\Admin\AppData\Local\Temp\Files\ggg.exe
                  "C:\Users\Admin\AppData\Local\Temp\Files\ggg.exe"
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:5992
              • C:\Users\Admin\AppData\Local\Temp\Files\tt.exe
                "C:\Users\Admin\AppData\Local\Temp\Files\tt.exe"
                3⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:5176
                • C:\Windows\sysmablsvr.exe
                  C:\Windows\sysmablsvr.exe
                  4⤵
                  • Modifies security service
                  • Windows security bypass
                  • Executes dropped EXE
                  • Windows security modification
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: SetClipboardViewer
                  PID:5744
                  • C:\Users\Admin\AppData\Local\Temp\179730380.exe
                    C:\Users\Admin\AppData\Local\Temp\179730380.exe
                    5⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    PID:5228
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
                      6⤵
                        PID:2316
                        • C:\Windows\system32\reg.exe
                          reg delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Upgrade Manager" /f
                          7⤵
                            PID:4264
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c schtasks /delete /f /tn "Windows Upgrade Manager"
                          6⤵
                            PID:5016
                            • C:\Windows\system32\schtasks.exe
                              schtasks /delete /f /tn "Windows Upgrade Manager"
                              7⤵
                                PID:5352
                      • C:\Users\Admin\AppData\Local\Temp\Files\chicken123.exe
                        "C:\Users\Admin\AppData\Local\Temp\Files\chicken123.exe"
                        3⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of WriteProcessMemory
                        PID:8
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:5752
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 264
                          4⤵
                          • Program crash
                          PID:6120
                      • C:\Users\Admin\AppData\Local\Temp\Files\ama.exe
                        "C:\Users\Admin\AppData\Local\Temp\Files\ama.exe"
                        3⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        PID:5516
                        • C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe
                          "C:\Users\Admin\AppData\Local\Temp\fc9e0aaab7\defnur.exe"
                          4⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          PID:2132
                      • C:\Users\Admin\AppData\Local\Temp\Files\sgx4824p.exe
                        "C:\Users\Admin\AppData\Local\Temp\Files\sgx4824p.exe"
                        3⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        PID:6096
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c copy Za Za.bat & Za.bat
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:5332
                          • C:\Windows\SysWOW64\tasklist.exe
                            tasklist
                            5⤵
                            • Enumerates processes with tasklist
                            • System Location Discovery: System Language Discovery
                            PID:5624
                          • C:\Windows\SysWOW64\findstr.exe
                            findstr /I "wrsa opssvc"
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:2032
                          • C:\Windows\SysWOW64\tasklist.exe
                            tasklist
                            5⤵
                            • Enumerates processes with tasklist
                            • System Location Discovery: System Language Discovery
                            PID:4460
                          • C:\Windows\SysWOW64\findstr.exe
                            findstr -I "avastui avgui bdservicehost nswscsvc sophoshealth"
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:5544
                      • C:\Users\Admin\AppData\Local\Temp\Files\ovrflw.exe
                        "C:\Users\Admin\AppData\Local\Temp\Files\ovrflw.exe"
                        3⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Adds Run key to start application
                        PID:5624
                        • C:\Users\Admin\AppData\Roaming\Microsoft Network Agent\mswabnet.exe
                          "C:\Users\Admin\AppData\Roaming\Microsoft Network Agent\mswabnet.exe"
                          4⤵
                          • Executes dropped EXE
                          PID:5504
                      • C:\Users\Admin\AppData\Local\Temp\Files\DecryptJohn.exe
                        "C:\Users\Admin\AppData\Local\Temp\Files\DecryptJohn.exe"
                        3⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetThreadContext
                        • System Location Discovery: System Language Discovery
                        PID:4820
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:2872
                      • C:\Users\Admin\AppData\Local\Temp\Files\build_2024-07-24_23-16.exe
                        "C:\Users\Admin\AppData\Local\Temp\Files\build_2024-07-24_23-16.exe"
                        3⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:3856
                    • C:\Users\Admin\AppData\Local\Temp\39D8.tmp.zx.exe
                      "C:\Users\Admin\AppData\Local\Temp\39D8.tmp.zx.exe"
                      2⤵
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:4564
                      • C:\Users\Admin\AppData\Local\Temp\39D8.tmp.zx.exe
                        "C:\Users\Admin\AppData\Local\Temp\39D8.tmp.zx.exe"
                        3⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        PID:6048
                    • C:\Users\Admin\AppData\Local\Temp\3C59.tmp.x.exe
                      "C:\Users\Admin\AppData\Local\Temp\3C59.tmp.x.exe"
                      2⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5868
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
                      2⤵
                      • Command and Scripting Interpreter: PowerShell
                      PID:5972
                    • C:\Windows\System32\schtasks.exe
                      C:\Windows\System32\schtasks.exe /run /tn "Microsoft Windows Security"
                      2⤵
                        PID:5764
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#evrkcgqew#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'Microsoft Windows Security' /tr '''C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Microsoft Windows Security' -RunLevel 'Highest' -Force; }
                        2⤵
                        • Command and Scripting Interpreter: PowerShell
                        PID:368
                      • C:\Windows\System32\conhost.exe
                        C:\Windows\System32\conhost.exe
                        2⤵
                          PID:5020
                        • C:\Windows\System32\dwm.exe
                          C:\Windows\System32\dwm.exe
                          2⤵
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:5180
                      • C:\Program Files (x86)\Mesh Agent\MeshAgent.exe
                        "C:\Program Files (x86)\Mesh Agent\MeshAgent.exe"
                        1⤵
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Drops file in Program Files directory
                        • System Location Discovery: System Language Discovery
                        • Modifies data under HKEY_USERS
                        PID:5584
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 8 -ip 8
                        1⤵
                          PID:5664
                        • C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe
                          "C:\Users\Admin\Microsoft Windows Security\winupsecvmgr.exe"
                          1⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          PID:5684

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\ProgramData\AFCAAEGDBKJJKECBKFHC

                          Filesize

                          11KB

                          MD5

                          ad3f5bfd85773d3a80afc0f9b8fc2672

                          SHA1

                          2f85eb0dd319895b00339a2b5139958f135842d3

                          SHA256

                          e93838fb0251c9cbd7c0a05110da6ce40723053cbb20b581190ac4e52212d151

                          SHA512

                          bb76c647d24b0e9a6c6f78f0d56125306041007309d484d68753452e4a769b75a2e20ee07119f4cd88dc8ae8246b4b5ac32ba5ea0d81bdea5cec935beadf268c

                        • C:\ProgramData\mozglue.dll

                          Filesize

                          593KB

                          MD5

                          c8fd9be83bc728cc04beffafc2907fe9

                          SHA1

                          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                          SHA256

                          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                          SHA512

                          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                        • C:\Users\Admin\AppData\Local\Temp\179730380.exe

                          Filesize

                          8KB

                          MD5

                          39f45edb23427ebf63197ca138ddb282

                          SHA1

                          4be1b15912c08f73687c0e4c74af0979c17ff7d5

                          SHA256

                          77fbb0d8630024634880c37da59ce57d1b38c7e85bdcc14c697db9e79c24e0de

                          SHA512

                          410f6baad25b256daebfa5d8b8a495429c9e26e7de767b2a0e6e4a75e543b77dbd0abca0335fb1f0d91e49e292b42cedc6edd72d25a3c4c62330e2b31c054cc6

                        • C:\Users\Admin\AppData\Local\Temp\179730380.exe

                          Filesize

                          8KB

                          MD5

                          cb8420e681f68db1bad5ed24e7b22114

                          SHA1

                          416fc65d538d3622f5ca71c667a11df88a927c31

                          SHA256

                          5850892f67f85991b31fc90f62c8b7791afeb3c08ae1877d857aa2b59471a2ea

                          SHA512

                          baaabcc4ad5d409267a34ed7b20e4afb4d247974bfc581d39aae945e5bf8a673a1f8eacae2e6783480c8baaeb0a80d028274a202d456f13d0af956afa0110fdf

                        • C:\Users\Admin\AppData\Local\Temp\2552126768.exe

                          Filesize

                          108KB

                          MD5

                          1fcb78fb6cf9720e9d9494c42142d885

                          SHA1

                          fef9c2e728ab9d56ce9ed28934b3182b6f1d5379

                          SHA256

                          84652bb8c63ca4fd7eb7a2d6ef44029801f3057aa2961867245a3a765928dd02

                          SHA512

                          cdf58e463af1784aea86995b3e5d6b07701c5c4095e30ec80cc901ffd448c6f4f714c521bf8796ffa8c47538bf8bf5351e157596efaa7ab88155d63dc33f7dc3

                        • C:\Users\Admin\AppData\Local\Temp\3019822051.exe

                          Filesize

                          49KB

                          MD5

                          d66a021c5973288cbddc24f25cbe7ff5

                          SHA1

                          19c192afbf1d0205b2ef3b21f1eaf79b2de7bd7d

                          SHA256

                          0addd61d01ea1b70f07eafcb6686f3373a320d09440e217f5b3ae9beb479bc46

                          SHA512

                          08a5ce796fb4ecbead56f5ca84a3154ef956850a7ef5329e3e5334a954702ef931ed995ac6782c3816210e710770a5a5407df8416182d14cd9f047d0480b6b7a

                        • C:\Users\Admin\AppData\Local\Temp\39D8.tmp.zx.exe

                          Filesize

                          5.6MB

                          MD5

                          56378523b35cf8ccf01b7dfd0a7893ab

                          SHA1

                          ab9be30874a86ecb840bad21ca89840ed61b9c52

                          SHA256

                          ddb9ac7733ce2526159ac300526b41acfe437b45c73a404fc29a29ab2f0a183f

                          SHA512

                          ff32919ce3c9e074caf16e557e46d517b0e9fa15b71e01ef771cc66e369330a08bca8f7e94f7013bcac1db9482a5acb11ac152d7739e282efbe32764dd148d82

                        • C:\Users\Admin\AppData\Local\Temp\3C59.tmp.x.exe

                          Filesize

                          300KB

                          MD5

                          97eb7baa28471ec31e5373fcd7b8c880

                          SHA1

                          397efcd2fae0589e9e29fc2153ffb18a86a9b709

                          SHA256

                          9053b6bbaf941a840a7af09753889873e51f9b15507990979537b6c982d618cb

                          SHA512

                          323389357a9ffc5e96f5d6ef78ceb2ec5c62e4dcc1e868524b4188aff2497810ad16de84e498a3e49640ad0d58eadf2ba9c6ec24e512aa64d319331f003d7ced

                        • C:\Users\Admin\AppData\Local\Temp\3EFA.tmp.Diamotrix.exe

                          Filesize

                          23KB

                          MD5

                          18ba97473a5ff4ecd0d25aee1ac36ddd

                          SHA1

                          9b9dad90f6dcd55c6d20857649ce5279c6a9b8d7

                          SHA256

                          feefce2d619431c33f6e7167eb467df24ee45b45a8b7c8f804cdf0aa1a04b732

                          SHA512

                          0601b17d4b715ba4def5811f94ceeecc62542a9ce53ccef548313e69499cf34f80c8c231d3dd56c71adb05bfcccede58e4d8f76838cd1b2095003bd804ab7c77

                        • C:\Users\Admin\AppData\Local\Temp\Files\3544436.exe

                          Filesize

                          1.3MB

                          MD5

                          1de4c3cc42232c1e3d7c09404f57b450

                          SHA1

                          28adaa72fe927ade1b3e073de288e1b6f294d346

                          SHA256

                          131e2baac32f898ab2d7da10d8c79f546977bc1d1d585ba687387101610ed3b9

                          SHA512

                          580aae865d815236e1030b173b67dc7002c70cb82caf00953999174833ce22512a4276cae4357b81e0c44e83dbf22eee9713c1138db0887e6f83d72495255671

                        • C:\Users\Admin\AppData\Local\Temp\Files\ConsoleApp3.exe

                          Filesize

                          15KB

                          MD5

                          eb2e78bbb601facb768bd61a8e38b372

                          SHA1

                          d51b9b3a138ae1bf345e768ee94efdced4853ff7

                          SHA256

                          09d97363cb679a12a09d9795569b38193991362c3b6981d7154b17d34f36f8cf

                          SHA512

                          5c2ce80953a39393a6a63c772390709e2140bf9b7e7a7765767bc5ae6fb27e52fa7f9237a918dd8060a83667f29ed47e12adef26127f183bea58859e93c3b9f4

                        • C:\Users\Admin\AppData\Local\Temp\Files\DecryptJohn.exe

                          Filesize

                          1.9MB

                          MD5

                          c1853d1c36dc461668c9af843d07cc58

                          SHA1

                          3c59af9da25113235365a6c08b44a3d6bfd3a1e8

                          SHA256

                          83cd3dcf4a855593ff0f594158ec9d27a8eb94172a92c4092138db7abfbc8793

                          SHA512

                          fd110a42927d580586081647d4d03f4cac6dd5934855e55e07794eec91b9d9d2e61a3d6cee2da5399966beae6cd1652b4d5583c492646dde87c824907e231463

                        • C:\Users\Admin\AppData\Local\Temp\Files\Installeraus.exe

                          Filesize

                          1.8MB

                          MD5

                          749bd6bf56a6d0ad6a8a4e5712377555

                          SHA1

                          6e4ff640a527ed497505c402d1e7bdb26f3dd472

                          SHA256

                          e6148c7e8cec3a4565e97a139d2b09dbdf2f30460054fa168624fdc1050421d3

                          SHA512

                          250f1825f5d2577124606818a8c370bb862d74dfebddd8c25ec2b43448626b583e166e101f65ebe12b66b8767af7ad75a8d9f5a3afd4e10f4dd3e6239efe9a7d

                        • C:\Users\Admin\AppData\Local\Temp\Files\Setup.exe

                          Filesize

                          279KB

                          MD5

                          d0cce7870080bd889dba1f4cfd2b3b26

                          SHA1

                          a973389aa0908d7b56115aff9cd4878fbd9381f9

                          SHA256

                          8ff3039072ecb32c50f446d6857aceef55547486f0572fe70feb5b1fa4c4727a

                          SHA512

                          5fde0ed0ad44569d290972f336d0ca29c38f49bacefe7ba974cbb17d6db7a1a57a8e4f8618f438820c2ff386a6b9c5b8b702c24ee8718cae51379d1566729548

                        • C:\Users\Admin\AppData\Local\Temp\Files\ama.exe

                          Filesize

                          1.8MB

                          MD5

                          00a9f11168b0eedaf78b8c4ddd7f5d24

                          SHA1

                          e3dde595f2017f54eaaa312275be9030d3614b3a

                          SHA256

                          878e842e5673accf2acd81f88e38db77385c7856fd00d07efea564d6113afc59

                          SHA512

                          683a391acfbf1e6b0a4e0bd9edfa2864da1cdf127e1280820cdf84851f8f92c9be1c3e68ab37067fc0dfa4b500f6ab29a31b043f7520bf8af27b5efe456862ac

                        • C:\Users\Admin\AppData\Local\Temp\Files\build_2024-07-24_23-16.exe

                          Filesize

                          202KB

                          MD5

                          72bcb9136fde10fdddfaa593f2cdfe42

                          SHA1

                          17ef3b622d8a1c0cb0b4c0f2a41fdd1b4ac776dc

                          SHA256

                          bb38168a3222858c6b499dfceec3e3dc9055777b91869dbece107c241d97c436

                          SHA512

                          12f08e357049fdfcdd7dfe272d34b33926695383f201ba36041c3023872fe8679234668318244c2b91df95c65ec4a78c4fc4df651ffb061962c9732b0818cb06

                        • C:\Users\Admin\AppData\Local\Temp\Files\chicken123.exe

                          Filesize

                          597KB

                          MD5

                          adb486fe713afa6ebb7bd56291323d30

                          SHA1

                          ac0933eabcfc7991359240a8fa36b14f20a111a3

                          SHA256

                          b3b82b968621fc4ba2bd1be1dfe56ed7c4d71c52f08f2e00bdd05422e8db92ec

                          SHA512

                          6600bd572eb9999b06016422fdc74364ebb8bd7792be901324adcb19b3c9a0854998b46dad31861faf6e67e54e9e8f9b7624d452f208e2ee3f614101b636aec8

                        • C:\Users\Admin\AppData\Local\Temp\Files\ggg.exe

                          Filesize

                          7.5MB

                          MD5

                          50242f37a1fb1673af2619b7d8595dcd

                          SHA1

                          f9301a1b4a072a625ef2e898dfcbdbc8e6735c9f

                          SHA256

                          e82797a9b4a8fcc80f7a4521719d313119cc408b867b721a79f5967cdbac8a8c

                          SHA512

                          bb8622c9698e92723fab060ccbb022304e6d00601dadbc5d5e5d5a185a430fafad982c090a813a7a1424d4309cfd810fcd4eb382ef2afa7a8347820de19b2c15

                        • C:\Users\Admin\AppData\Local\Temp\Files\nc64.exe

                          Filesize

                          44KB

                          MD5

                          523613a7b9dfa398cbd5ebd2dd0f4f38

                          SHA1

                          3e92f697d642d68bb766cc93e3130b36b2da2bab

                          SHA256

                          3e59379f585ebf0becb6b4e06d0fbbf806de28a4bb256e837b4555f1b4245571

                          SHA512

                          2ca42e21ebc26233c3822851d9fc82f950186820e10d3601c92b648415eb720f0e1a3a6d9d296497a3393a939a9424c47b1e5eaedfd864f96e3ab8986f6b35b5

                        • C:\Users\Admin\AppData\Local\Temp\Files\newtpp.exe

                          Filesize

                          79KB

                          MD5

                          0c883b1d66afce606d9830f48d69d74b

                          SHA1

                          fe431fe73a4749722496f19b3b3ca0b629b50131

                          SHA256

                          d921fc993574c8be76553bcf4296d2851e48ee39b958205e69bdfd7cf661d2b1

                          SHA512

                          c047452a23efad4262479fbfeb5e23f9497d7cefd4cbb58e869801206669c2a0759698c70d18050316798d5d939b989537fdce3842aa742449f5e08ed7fa60a5

                        • C:\Users\Admin\AppData\Local\Temp\Files\ovrflw.exe

                          Filesize

                          1.4MB

                          MD5

                          3adfc7cf1e296c6fb703991c5233721d

                          SHA1

                          fddd2877ce7952b91c3f841ca353235d6d8eea67

                          SHA256

                          6bc23179d079d220337ede270113d4a474b549f5f0c7fd57f3d33d318f7ae471

                          SHA512

                          5136525626c3021baf8d35be0d76473cc03bfe2433682d613650b8e4bb444f767d2d14ac0070ce46c4c220e0a71a8f2e789e4e684e2042bd78b60f68f35a652b

                        • C:\Users\Admin\AppData\Local\Temp\Files\sgx4824p.exe

                          Filesize

                          1.7MB

                          MD5

                          6309329d5a036aacee830839f82c5b2a

                          SHA1

                          6862500fdd7e9741ac7b54ee2d7060e5e28d7f52

                          SHA256

                          7305c4bb03ec5c017a4297e7e47d7749e56ca5bb56d3d5399a37cd0ae6b3bfd0

                          SHA512

                          0f0b56e70d88418bba971d28c42b16534dd16d706d0b9bb9b372b80860ff579eed8c0a3984654933ac5b6717aa34a2bcf6c1a78f6ea45e0953b3a9fcd85737f2

                        • C:\Users\Admin\AppData\Local\Temp\Files\stealc_daval.exe

                          Filesize

                          187KB

                          MD5

                          7a02aa17200aeac25a375f290a4b4c95

                          SHA1

                          7cc94ca64268a9a9451fb6b682be42374afc22fd

                          SHA256

                          836799fd760eba25e15a55c75c50b977945c557065a708317e00f2c8f965339e

                          SHA512

                          f6ebfe7e087aa354722cea3fddd99b1883a862fb92bb5a5a86782ea846a1bff022ab7db4397930bcabaa05cb3d817de3a89331d41a565bc1da737f2c5e3720b6

                        • C:\Users\Admin\AppData\Local\Temp\Files\tt.exe

                          Filesize

                          88KB

                          MD5

                          ababca6d12d96e8dd2f1d7114b406fae

                          SHA1

                          dcd9798e83ec688aacb3de8911492a232cb41a32

                          SHA256

                          a992920e64a64763f3dd8c2a431a0f5e56e5b3782a1496de92bc80ee71cca5ba

                          SHA512

                          b7fc70c176bdc74cf68b14e694f3e53142e64d39bd6d3e0f2e3a74ce3178ea606f92f760d21db69d72ae6677545a47c7bf390fb65cd5247a48e239f6ae8f7b8f

                        • C:\Users\Admin\AppData\Local\Temp\TmpDE93.tmp

                          Filesize

                          2KB

                          MD5

                          1420d30f964eac2c85b2ccfe968eebce

                          SHA1

                          bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                          SHA256

                          f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                          SHA512

                          6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                        • C:\Users\Admin\AppData\Local\Temp\Za.bat

                          Filesize

                          16KB

                          MD5

                          29a0ea7fbce305cb957d7f88a2eb1d6b

                          SHA1

                          eed117e955aad6ac880bab3c530634da6bb6315f

                          SHA256

                          229d200f4b5bf50af37b19d601448152886be2e6110a7f7de7d5b91e4ed54d26

                          SHA512

                          4a63a11cc013295a5c8677c66e6386412ff58ce53a77a92f7ba7d1004960d5b1c27922fa006c3e48d06ebb76bc491753dbe7ca23ce88c0f424110655977b0d44

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\VCRUNTIME140.dll

                          Filesize

                          87KB

                          MD5

                          0e675d4a7a5b7ccd69013386793f68eb

                          SHA1

                          6e5821ddd8fea6681bda4448816f39984a33596b

                          SHA256

                          bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1

                          SHA512

                          cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\_ctypes.pyd

                          Filesize

                          120KB

                          MD5

                          f1e33a8f6f91c2ed93dc5049dd50d7b8

                          SHA1

                          23c583dc98aa3f6b8b108db5d90e65d3dd72e9b4

                          SHA256

                          9459d246df7a3c638776305cf3683946ba8db26a7de90df8b60e1be0b27e53c4

                          SHA512

                          229896da389d78cbdf2168753ed7fcc72d8e0e62c6607a3766d6d47842c0abd519ac4f5d46607b15e7ba785280f9d27b482954e931645337a152b8a54467c6a5

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-console-l1-1-0.dll

                          Filesize

                          19KB

                          MD5

                          b56d69079d2001c1b2af272774b53a64

                          SHA1

                          67ede1c5a71412b11847f79f5a684eabaf00de01

                          SHA256

                          f3a41d882544202b2e1bdf3d955458be11fc7f76ba12668388a681870636f143

                          SHA512

                          7eb8fe111dd2e1f7e308b622461eb311c2b9fc4ef44c76e1def6c524eb7281d5522af12211f1f91f651f2b678592d2997fe4cd15724f700deaff314a1737b3a8

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-datetime-l1-1-0.dll

                          Filesize

                          19KB

                          MD5

                          5af784f599437629deea9fe4e8eb4799

                          SHA1

                          3c891b920fd2703edd6881117ea035ced5a619f6

                          SHA256

                          7e5bd3ee263d09c7998e0d5ffa684906ddc56da61536331c89c74b039df00c7c

                          SHA512

                          4df58513cf52511c0d2037cdc674115d8ed5a0ed4360eb6383cc6a798a7037f3f7f2d587797223ed7797ccd476f1c503b3c16e095843f43e6b87d55ad4822d70

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-debug-l1-1-0.dll

                          Filesize

                          19KB

                          MD5

                          e1ca15cf0597c6743b3876af23a96960

                          SHA1

                          301231f7250431bd122b12ed34a8d4e8bb379457

                          SHA256

                          990e46d8f7c9574a558ebdfcb8739fbccba59d0d3a2193c9c8e66807387a276d

                          SHA512

                          7c9dacd882a0650bf2f553e9bc5647e6320a66021ac4c1adc802070fd53de4c6672a7bacfd397c51009a23b6762e85c8017895e9347a94d489d42c50fa0a1c42

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-errorhandling-l1-1-0.dll

                          Filesize

                          19KB

                          MD5

                          8d6599d7c4897dcd0217070cca074574

                          SHA1

                          25eacaaa4c6f89945e97388796a8c85ba6fb01fb

                          SHA256

                          a011260fafaaaefd7e7326d8d5290c6a76d55e5af4e43ffa4de5fea9b08fa928

                          SHA512

                          e8e2e7c5bff41ccaa0f77c3cfee48dac43c11e75688f03b719cc1d716db047597a7a2ce25b561171ef259957bdcd9dd4345a0e0125db2b36f31698ba178e2248

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-file-l1-1-0.dll

                          Filesize

                          22KB

                          MD5

                          642b29701907e98e2aa7d36eba7d78b8

                          SHA1

                          16f46b0e057816f3592f9c0a6671111ea2f35114

                          SHA256

                          5d72feac789562d445d745a55a99536fa9302b0c27b8f493f025ba69ba31941c

                          SHA512

                          1beab2b368cc595beb39b2f5a2f52d334bc42bf674b8039d334c6d399c966aff0b15876105f0a4a54fa08e021cb44907ed47d31a0af9e789eb4102b82025cf57

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-file-l1-2-0.dll

                          Filesize

                          19KB

                          MD5

                          f0c73f7454a5ce6fb8e3d795fdb0235d

                          SHA1

                          acdd6c5a359421d268b28ddf19d3bcb71f36c010

                          SHA256

                          2a59dd891533a028fae7a81e690e4c28c9074c2f327393fab17329affe53fd7b

                          SHA512

                          bd6cf4e37c3e7a1a3b36f42858af1b476f69caa4ba1fd836a7e32220e5eff7ccc811c903019560844af988a7c77cc41dc6216c0c949d8e04516a537da5821a3e

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-file-l2-1-0.dll

                          Filesize

                          19KB

                          MD5

                          7d4d4593b478b4357446c106b64e61f8

                          SHA1

                          8a4969c9e59d7a7485c8cc5723c037b20dea5c9d

                          SHA256

                          0a6e2224cde90a0d41926e8863f9956848ffbf19848e8855bd08953112afc801

                          SHA512

                          7bc9c473705ec98ba0c1da31c295937d97710cedefc660f6a5cb0512bae36ad23bebb2f6f14df7ce7f90ec3f817b02f577317fdd514560aab22cb0434d8e4e0b

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-handle-l1-1-0.dll

                          Filesize

                          19KB

                          MD5

                          7bc1b8712e266db746914db48b27ef9c

                          SHA1

                          c76eb162c23865b3f1bd7978f7979d6ba09ccb60

                          SHA256

                          f82d05aea21bcf6337ef45fbdad6d647d17c043a67b44c7234f149f861a012b9

                          SHA512

                          db6983f5f9c18908266dbf01ef95ebae49f88edc04a0515699ef12201ac9a50f09939b8784c75ae513105ada5b155e5330bd42d70f8c8c48fe6005513aefad2a

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-heap-l1-1-0.dll

                          Filesize

                          19KB

                          MD5

                          b071e761cea670d89d7ae80e016ce7e6

                          SHA1

                          c675be753dbef1624100f16674c2221a20cf07dd

                          SHA256

                          63fb84a49308b857804ae1481d2d53b00a88bbd806d257d196de2bd5c385701e

                          SHA512

                          f2ecbdaba3516d92bd29dcce618185f1755451d95c7dbbe23f8215318f6f300a9964c93ec3ed65c5535d87be82b668e1d3025a7e325af71a05f14e15d530d35f

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-interlocked-l1-1-0.dll

                          Filesize

                          19KB

                          MD5

                          1dccf27f2967601ce6666c8611317f03

                          SHA1

                          d8246df2ed9ec4a8a719fd4b1db4fd8a71ef679b

                          SHA256

                          6a83ab9a413afd74d77a090f52784b0128527bee9cb0a4224c59d5c75fc18387

                          SHA512

                          70b96d69d609211f8b9e05fa510ea7d574ae8da3a6498f5c982aee71635b8a749162247055b7ba21a884bfa06c1415b68912c463f0f1b6ffb9049f3532386877

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-libraryloader-l1-1-0.dll

                          Filesize

                          19KB

                          MD5

                          569a7ac3f6824a04282ff708c629a6d2

                          SHA1

                          fc0d78de1075dfd4c1024a72074d09576d4d4181

                          SHA256

                          84c579a8263a87991ca1d3aee2845e1c262fb4b849606358062093d08afdc7a2

                          SHA512

                          e9cbff82e32540f9230cead9063acb1aceb7ccc9f3338c0b7ad10b0ac70ff5b47c15944d0dce33ea8405554aa9b75de30b26ae2ca55db159d45b6e64bc02a180

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-localization-l1-2-0.dll

                          Filesize

                          21KB

                          MD5

                          1d75e7b9f68c23a195d408cf02248119

                          SHA1

                          62179fc9a949d238bb221d7c2f71ba7c1680184c

                          SHA256

                          67ebe168b7019627d68064043680674f9782fda7e30258748b29412c2b3d4c6b

                          SHA512

                          c2ee84a9aeac34f7b51426d12f87bb35d8c3238bb26a6e14f412ea485e5bd3b8fb5b1231323d4b089cf69d8180a38ddd7fd593cc52cbdf250125ad02d66eea9d

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-memory-l1-1-0.dll

                          Filesize

                          19KB

                          MD5

                          623283471b12f1bdb83e25dbafaf9c16

                          SHA1

                          ecbba66f4dca89a3faa3e242e30aefac8de02153

                          SHA256

                          9ca500775fee9ff69b960d65040b8dc415a2efde2982a9251ee6a3e8de625bc7

                          SHA512

                          54b69ffa2c263be4ddadca62fa2867fea6148949d64c2634745db3dcbc1ba0ecf7167f02fa53efd69eaaee81d617d914f370f26ca16ee5850853f70c69e9a61f

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-namedpipe-l1-1-0.dll

                          Filesize

                          19KB

                          MD5

                          61f70f2d1e3f22e976053df5f3d8ecb7

                          SHA1

                          7d224b7f404cde960e6b7a1c449b41050c8e9c58

                          SHA256

                          2695761b010d22fdfda2b5e73cf0ac7328ccc62b4b28101d5c10155dd9a48020

                          SHA512

                          1ddc568590e9954db198f102be99eabb4133b49e9f3b464f2fc7f31cc77d06d5a7132152f4b331332c42f241562ee6c7bf1c2d68e546db3f59ab47eaf83a22cf

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-processenvironment-l1-1-0.dll

                          Filesize

                          20KB

                          MD5

                          1322690996cf4b2b7275a7950bad9856

                          SHA1

                          502e05ed81e3629ea3ed26ee84a4e7c07f663735

                          SHA256

                          5660030ee4c18b1610fb9f46e66f44d3fc1cf714ecce235525f08f627b3738d7

                          SHA512

                          7edc06bfa9e633351291b449b283659e5dd9e706dd57ade354bce3af55df4842491af27c7721b2acc6948078bdfc8e9736fec46e0641af368d419c7ed6aebd44

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-processthreads-l1-1-0.dll

                          Filesize

                          21KB

                          MD5

                          95612a8a419c61480b670d6767e72d09

                          SHA1

                          3b94d1745aff6aafeff87fed7f23e45473f9afc9

                          SHA256

                          6781071119d66757efa996317167904697216ad72d7c031af4337138a61258d4

                          SHA512

                          570f15c2c5aa599332dd4cfb3c90da0dd565ca9053ecf1c2c05316a7f623615dd153497e93b38df94971c8abf2e25bc1aaaf3311f1cda432f2670b32c767012a

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-processthreads-l1-1-1.dll

                          Filesize

                          19KB

                          MD5

                          d6ad0f2652460f428c0e8fc40b6f6115

                          SHA1

                          1a5152871abc5cf3d4868a218de665105563775e

                          SHA256

                          4ef09fa6510eeebb4855b6f197b20a7a27b56368c63cc8a3d1014fa4231ab93a

                          SHA512

                          ceafeee932919bc002b111d6d67b7c249c85d30da35dfbcebd1f37db51e506ac161e4ee047ff8f7bf0d08da6a7f8b97e802224920bd058f8e790e6fa0ee48b22

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-profile-l1-1-0.dll

                          Filesize

                          18KB

                          MD5

                          654d95515ab099639f2739685cb35977

                          SHA1

                          9951854a5cf407051ce6cd44767bfd9bd5c4b0cc

                          SHA256

                          c4868e4cebdf86126377a45bd829d88449b4aa031c9b1c05edc47d6d395949d4

                          SHA512

                          9c9dd64a3ad1136ba62cca14fc27574faaebc3de1e371a86b83599260424a966dfd813991a5ef0b2342e0401cb99ce83cd82c19fcae73c7decdb92bac1fb58a8

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-rtlsupport-l1-1-0.dll

                          Filesize

                          19KB

                          MD5

                          e6b7681ccc718ddb69c48abe8709fdd6

                          SHA1

                          a518b705746b2c6276f56a2f1c996360b837d548

                          SHA256

                          4b532729988224fe5d98056cd94fc3e8b4ba496519f461ef5d9d0ff9d9402d4b

                          SHA512

                          89b20affaa23e674543f0f2e9b0a8b3ecd9a8a095e19d50e11c52cb205dafdbf2672892fd35b1c45f16e78ae9b61525de67dbe7673f8ca450aa8c42feeac0895

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-string-l1-1-0.dll

                          Filesize

                          19KB

                          MD5

                          bcb412464f01467f1066e94085957f42

                          SHA1

                          716c11b5d759d59dbfec116874e382d69f9a25b6

                          SHA256

                          f040b6e07935b67599ea7e32859a3e93db37ff4195b28b4451ad0d274db6330e

                          SHA512

                          79ec0c5ee21680843c8b7f22da3155b7607d5be269f8a51056cc5f060ad3a48ced3b6829117262aba1a90e692374b59ddfe92105d14179f631efc0c863bfdecb

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-synch-l1-1-0.dll

                          Filesize

                          21KB

                          MD5

                          b98598657162de8fbc1536568f1e5a4f

                          SHA1

                          f7c020220025101638fd690d86c53d895a03e53c

                          SHA256

                          f596c72be43db3a722b7c7a0fd3a4d5aea68267003986fbfd278702af88efa74

                          SHA512

                          ad5f46a3f4f6e64a5dcb85c328f1b8daefa94fc33f59922328fdcfedc04a8759f16a1a839027f74b7d7016406c20ac47569277620d6b909e09999021b669a0d6

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-synch-l1-2-0.dll

                          Filesize

                          19KB

                          MD5

                          b751571148923d943f828a1deb459e24

                          SHA1

                          d4160404c2aa6aeaf3492738f5a6ce476a0584a6

                          SHA256

                          b394b1142d060322048fb6a8ac6281e4576c0e37be8da772bc970f352dd22a20

                          SHA512

                          26e252ff0c01e1e398ebddcc5683a58cdd139161f2b63b65bde6c3e943e85c0820b24486859c2c597af6189de38ca7fe6fa700975be0650cb53c791cd2481c9d

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-sysinfo-l1-1-0.dll

                          Filesize

                          20KB

                          MD5

                          8aea681e0e2b9abbf73a924003247dbb

                          SHA1

                          5bafc2e0a3906723f9b12834b054e6f44d7ff49f

                          SHA256

                          286068a999fe179ee91b289360dd76e89365900b130a50e8651a9b7ece80b36d

                          SHA512

                          08c83a729036c94148d9a5cbc03647fa2adea4fba1bbb514c06f85ca804eefbf36c909cb6edc1171da8d4d5e4389e15e52571baa6987d1f1353377f509e269ab

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-timezone-l1-1-0.dll

                          Filesize

                          19KB

                          MD5

                          eab486e4719b916cad05d64cd4e72e43

                          SHA1

                          876c256fb2aeb0b25a63c9ee87d79b7a3c157ead

                          SHA256

                          05fe96faa8429992520451f4317fbceba1b17716fa2caf44ddc92ede88ce509d

                          SHA512

                          c50c3e656cc28a2f4f6377ba24d126bdc248a3125dca490994f8cace0a4903e23346ae937bb5b0a333f7d39ece42665ae44fde2fd5600873489f3982151a0f5d

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-core-util-l1-1-0.dll

                          Filesize

                          19KB

                          MD5

                          edd61ff85d75794dc92877f793a2cef6

                          SHA1

                          de9f1738fc8bf2d19aa202e34512ec24c1ccb635

                          SHA256

                          8aca888849e9089a3a56fa867b16b071951693ab886843cfb61bd7a5b08a1ece

                          SHA512

                          6cef9b256cdca1a401971ca5706adf395961b2d3407c1fff23e6c16f7e2ce6d85d946843a53532848fcc087c18009c08f651c6eb38112778a2b4b33e8c64796c

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-crt-conio-l1-1-0.dll

                          Filesize

                          20KB

                          MD5

                          22bfe210b767a667b0f3ed692a536e4e

                          SHA1

                          88e0ff9c141d8484b5e34eaaa5e4be0b414b8adf

                          SHA256

                          f1a2499cc238e52d69c63a43d1e61847cf852173fe95c155056cfbd2cb76abc3

                          SHA512

                          cbea3c690049a73b1a713a2183ff15d13b09982f8dd128546fd3db264af4252ccd390021dee54435f06827450da4bd388bd6ff11b084c0b43d50b181c928fd25

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-crt-convert-l1-1-0.dll

                          Filesize

                          23KB

                          MD5

                          da5e087677c8ebbc0062eac758dfed49

                          SHA1

                          ca69d48efa07090acb7ae7c1608f61e8d26d3985

                          SHA256

                          08a43a53a66d8acb2e107e6fc71213cedd180363055a2dc5081fe5a837940dce

                          SHA512

                          6262e9a0808d8f64e5f2dfad5242cd307e2f5eaa78f0a768f325e65c98db056c312d79f0b3e63c74e364af913a832c1d90f4604fe26cc5fb05f3a5a661b12573

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-crt-environment-l1-1-0.dll

                          Filesize

                          19KB

                          MD5

                          33a0fe1943c5a325f93679d6e9237fee

                          SHA1

                          737d2537d602308fc022dbc0c29aa607bcdec702

                          SHA256

                          5af7aa065ffdbf98d139246e198601bfde025d11a6c878201f4b99876d6c7eac

                          SHA512

                          cab7fcaa305a9ace1f1cc7077b97526bebc0921adf23273e74cd42d7fe99401d4f7ede8ecb9847b6734a13760b9ebe4dbd2465a3db3139ed232dbef68fb62c54

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-crt-filesystem-l1-1-0.dll

                          Filesize

                          21KB

                          MD5

                          633dca52da4ebaa6f4bf268822c6dc88

                          SHA1

                          1ebfc0f881ce338d2f66fcc3f9c1cbb94cdc067e

                          SHA256

                          424fd5d3d3297a8ab1227007ef8ded5a4f194f24bd573a5211be71937aa55d22

                          SHA512

                          ed058525ee7b4cc7e12561c7d674c26759a4301322ff0b3239f3183911ce14993614e3199d8017b9bfde25c8cb9ac0990d318bb19f3992624b39ec0f084a8df1

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-crt-heap-l1-1-0.dll

                          Filesize

                          20KB

                          MD5

                          43bf2037bfd3fb60e1fedac634c6f86e

                          SHA1

                          959eebe41d905ad3afa4254a52628ec13613cf70

                          SHA256

                          735703c0597da278af8a6359fc051b9e657627f50ad5b486185c2ef328ad571b

                          SHA512

                          7042846c009efea45ca5fafdc08016eca471a8c54486ba03f212abba47467f8744e9546c8f33214620f97dbcc994e3002788ad0db65b86d8a3e4ff0d8a9d0d05

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-crt-locale-l1-1-0.dll

                          Filesize

                          19KB

                          MD5

                          d51bc845c4efbfdbd68e8ccffdad7375

                          SHA1

                          c82e580ec68c48e613c63a4c2f9974bb59182cf6

                          SHA256

                          89d9f54e6c9ae1cb8f914da1a2993a20de588c18f1aaf4d66efb20c3a282c866

                          SHA512

                          2e353cf58ad218c3e068a345d1da6743f488789ef7c6b96492d48571dc64df8a71ad2db2e5976cfd04cf4b55455e99c70c7f32bd2c0f4a8bed1d29c2dafc17b0

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\api-ms-win-crt-math-l1-1-0.dll

                          Filesize

                          28KB

                          MD5

                          487f72d0cf7dc1d85fa18788a1b46813

                          SHA1

                          0aabff6d4ee9a2a56d40ee61e4591d4ba7d14c0d

                          SHA256

                          560baf1b87b692c284ccbb82f2458a688757231b315b6875482e08c8f5333b3d

                          SHA512

                          b7f4e32f98bfdcf799331253faebb1fb08ec24f638d8526f02a6d9371c8490b27d03db3412128ced6d2bbb11604247f3f22c8380b1bf2a11fb3bb92f18980185

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\base_library.zip

                          Filesize

                          821KB

                          MD5

                          f4981249047e4b7709801a388e2965af

                          SHA1

                          42847b581e714a407a0b73e5dab019b104ec9af2

                          SHA256

                          b191e669b1c715026d0732cbf8415f1ff5cfba5ed9d818444719d03e72d14233

                          SHA512

                          e8ef3fb3c9d5ef8ae9065838b124ba4920a3a1ba2d4174269cad05c1f318bc9ff80b1c6a6c0f3493e998f0587ef59be0305bc92e009e67b82836755470bc1b13

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\libffi-7.dll

                          Filesize

                          32KB

                          MD5

                          4424baf6ed5340df85482fa82b857b03

                          SHA1

                          181b641bf21c810a486f855864cd4b8967c24c44

                          SHA256

                          8c1f7f64579d01fedfde07e0906b1f8e607c34d5e6424c87abe431a2322eba79

                          SHA512

                          8adb94893ada555de2e82f006ab4d571fad8a1b16ac19ca4d2efc1065677f25d2de5c981473fabd0398f6328c1be1ebd4d36668ea67f8a5d25060f1980ee7e33

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\python38.dll

                          Filesize

                          4.0MB

                          MD5

                          d2a8a5e7380d5f4716016777818a32c5

                          SHA1

                          fb12f31d1d0758fe3e056875461186056121ed0c

                          SHA256

                          59ab345c565304f638effa7c0236f26041fd06e35041a75988e13995cd28ace9

                          SHA512

                          ad1269d1367f587809e3fbe44af703c464a88fa3b2ae0bf2ad6544b8ed938e4265aab7e308d999e6c8297c0c85c608e3160796325286db3188a3edf040a02ab7

                        • C:\Users\Admin\AppData\Local\Temp\_MEI45642\ucrtbase.dll

                          Filesize

                          1021KB

                          MD5

                          4e326feeb3ebf1e3eb21eeb224345727

                          SHA1

                          f156a272dbc6695cc170b6091ef8cd41db7ba040

                          SHA256

                          3c60056371f82e4744185b6f2fa0c69042b1e78804685944132974dd13f3b6d9

                          SHA512

                          be9420a85c82eeee685e18913a7ff152fcead72a90ddcc2bcc8ab53a4a1743ae98f49354023c0a32b3a1d919bda64b5d455f6c3a49d4842bbba4aa37c1d05d67

                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_keypy5be.qgg.ps1

                          Filesize

                          60B

                          MD5

                          d17fe0a3f47be24a6453e9ef58c94641

                          SHA1

                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                          SHA256

                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                          SHA512

                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                        • C:\Users\Admin\AppData\Roaming\d3d9.dll

                          Filesize

                          1.0MB

                          MD5

                          d96635ac81c8ec1d558199bf8d5d135a

                          SHA1

                          d02872db27de5ed99098e8c0ca83a260a2540e39

                          SHA256

                          6b929fd2e0bc0a354ba3a14eef56c695bd9e332094f1a0222d4ac07578fe518d

                          SHA512

                          7167bae0ebb04150782d48d11e30da09260b6eebbcff2a5b6d3ac991107122e8b38d219072537f8ac7bd8d7e022f46cf34fce06988df63e303c8ebd0a1d7e031

                        • C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\6B8A1EB9E0EF8FFBFB70762635E09AF14839627F

                          Filesize

                          1KB

                          MD5

                          9bfcdea8f5c0b72692cf75e8dae90290

                          SHA1

                          e8c89059d61aa570e51ddfd1bbed6df25465abc3

                          SHA256

                          99c018c0d66c1026cb716ec42f6b8d4f391f7da5fedcf060ec8f47c7e60b5c10

                          SHA512

                          4243a833c7f6dbf2f2ecfe877f34b477e990730f18b35be087798ad311ad388045409f8937251fc5d41a7014567a1e5a9a2e40a0e6a6417688d443fdf281552e

                        • C:\Windows\System32\drivers\etc\hosts

                          Filesize

                          1KB

                          MD5

                          7aed163a7c554d2c86de68d11a55d030

                          SHA1

                          8416928fbe1aa0ab181a6d6abe1e30ef82ea25ea

                          SHA256

                          b5f1a672f239b65afa1f8e8a0b7da5f793e9ff6f3f8aff2818c6c635f0b360b9

                          SHA512

                          6dc00db724ce2567754a79fc3f5e0e2133abad323ced5beed053fd51f93227c3e263e008ada5f853cf47a27080a66ef921c2c210be7386d589383fcb984b3cfd

                        • memory/1180-158-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-170-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-128-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-172-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-176-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-130-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-132-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-134-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-138-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-140-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-142-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-146-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-150-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-152-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-154-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-156-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-127-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-162-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-164-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-136-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-166-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-174-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-178-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-148-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-124-0x0000000000400000-0x00000000004DA000-memory.dmp

                          Filesize

                          872KB

                        • memory/1180-144-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-160-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-126-0x0000000004FA0000-0x00000000050AE000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/1180-168-0x0000000004FA0000-0x00000000050A9000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/1180-3161-0x0000000005160000-0x00000000051FE000-memory.dmp

                          Filesize

                          632KB

                        • memory/1180-3162-0x0000000005200000-0x000000000524C000-memory.dmp

                          Filesize

                          304KB

                        • memory/1804-2-0x00000000058F0000-0x000000000598C000-memory.dmp

                          Filesize

                          624KB

                        • memory/1804-0-0x000000007454E000-0x000000007454F000-memory.dmp

                          Filesize

                          4KB

                        • memory/1804-1-0x0000000000F40000-0x0000000000F48000-memory.dmp

                          Filesize

                          32KB

                        • memory/1804-100-0x000000007454E000-0x000000007454F000-memory.dmp

                          Filesize

                          4KB

                        • memory/1804-101-0x0000000074540000-0x0000000074CF0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/1804-3-0x0000000074540000-0x0000000074CF0000-memory.dmp

                          Filesize

                          7.7MB

                        • memory/2132-3448-0x0000000000900000-0x0000000000DC9000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/2132-3865-0x0000000000900000-0x0000000000DC9000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/3016-3365-0x0000000000A70000-0x0000000000A76000-memory.dmp

                          Filesize

                          24KB

                        • memory/3488-94-0x0000000008C40000-0x0000000008C82000-memory.dmp

                          Filesize

                          264KB

                        • memory/3488-95-0x0000000008E80000-0x0000000008EC6000-memory.dmp

                          Filesize

                          280KB

                        • memory/3488-98-0x0000000009070000-0x00000000090C3000-memory.dmp

                          Filesize

                          332KB

                        • memory/3488-80-0x0000000008B00000-0x0000000008B3E000-memory.dmp

                          Filesize

                          248KB

                        • memory/4008-103-0x0000000000400000-0x0000000000410000-memory.dmp

                          Filesize

                          64KB

                        • memory/4520-330-0x0000000000640000-0x0000000000883000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/4520-3241-0x0000000000640000-0x0000000000883000-memory.dmp

                          Filesize

                          2.3MB

                        • memory/4536-117-0x0000000000430000-0x000000000058E000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/4600-93-0x00000000001F0000-0x00000000001F8000-memory.dmp

                          Filesize

                          32KB

                        • memory/4820-3560-0x0000000000970000-0x0000000000B62000-memory.dmp

                          Filesize

                          1.9MB

                        • memory/4876-102-0x00007FF67E0F0000-0x00007FF67E13C000-memory.dmp

                          Filesize

                          304KB

                        • memory/5344-3321-0x00007FF7252E0000-0x00007FF72534C000-memory.dmp

                          Filesize

                          432KB

                        • memory/5344-3255-0x00007FF7252E0000-0x00007FF72534C000-memory.dmp

                          Filesize

                          432KB

                        • memory/5516-3447-0x0000000000750000-0x0000000000C19000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/5516-3432-0x0000000000750000-0x0000000000C19000-memory.dmp

                          Filesize

                          4.8MB

                        • memory/5624-3512-0x0000000000D30000-0x0000000000E92000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/5752-3325-0x0000000000400000-0x0000000000452000-memory.dmp

                          Filesize

                          328KB

                        • memory/5752-3343-0x0000000006510000-0x000000000652E000-memory.dmp

                          Filesize

                          120KB

                        • memory/5752-3342-0x0000000005E20000-0x0000000005E96000-memory.dmp

                          Filesize

                          472KB

                        • memory/5752-3346-0x0000000008800000-0x000000000884C000-memory.dmp

                          Filesize

                          304KB

                        • memory/5868-3177-0x0000000005A10000-0x0000000005A5C000-memory.dmp

                          Filesize

                          304KB

                        • memory/5868-3062-0x0000000005750000-0x00000000057E2000-memory.dmp

                          Filesize

                          584KB

                        • memory/5868-3242-0x00000000075A0000-0x0000000007762000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/5868-2781-0x0000000000DB0000-0x0000000000E02000-memory.dmp

                          Filesize

                          328KB

                        • memory/5868-2918-0x0000000005C60000-0x0000000006204000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/5868-3243-0x0000000008540000-0x0000000008A6C000-memory.dmp

                          Filesize

                          5.2MB

                        • memory/5868-3168-0x0000000006830000-0x0000000006E48000-memory.dmp

                          Filesize

                          6.1MB

                        • memory/5868-3240-0x0000000007FC0000-0x0000000008010000-memory.dmp

                          Filesize

                          320KB

                        • memory/5868-3169-0x0000000005AA0000-0x0000000005BAA000-memory.dmp

                          Filesize

                          1.0MB

                        • memory/5868-3239-0x0000000006380000-0x00000000063E6000-memory.dmp

                          Filesize

                          408KB

                        • memory/5868-3171-0x00000000059D0000-0x0000000005A0C000-memory.dmp

                          Filesize

                          240KB

                        • memory/5868-3170-0x0000000005950000-0x0000000005962000-memory.dmp

                          Filesize

                          72KB

                        • memory/5868-3087-0x00000000056E0000-0x00000000056EA000-memory.dmp

                          Filesize

                          40KB

                        • memory/5972-3399-0x00000185A2080000-0x00000185A20A2000-memory.dmp

                          Filesize

                          136KB

                        • memory/5992-3313-0x00007FF7252E0000-0x00007FF72534C000-memory.dmp

                          Filesize

                          432KB