Analysis

  • max time kernel
    723s
  • max time network
    750s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2025 03:58

General

  • Target

    UZI.exe

  • Size

    1.1MB

  • MD5

    8704d08e0f525a4845031d66f64382ac

  • SHA1

    a2f1438cbfa9692a467d816bbd04658191567719

  • SHA256

    6eb1179500bba11bb328612e0938cd5753d6569a45882a0ecc210f29fa5a7d54

  • SHA512

    3fca1309c6c02d917d67531f8083039812c9ba70bce4e6b3f8b3f7ece9229ab9598ecf5aeb56df4825f43264fba18c9f2cd2c0a4f7516d8fbe8ba5cc7db42b45

  • SSDEEP

    24576:Fam4MROxnF4HrrcI0AilFEvxHPRZoo1jXb2:FOMiaHrrcI0AilFEvxHPjr

Malware Config

Extracted

Family

orcus

C2

195.88.218.126:10134

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    false

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcus family
  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Orcurs Rat Executable 2 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 3 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 20 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 27 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 25 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 9 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 2 IoCs
  • NTFS ADS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:636
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:396
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 396 -s 3504
            3⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            PID:4520
        • C:\Windows\system32\dwm.exe
          "dwm.exe"
          2⤵
          • Checks SCSI registry key(s)
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious use of AdjustPrivilegeToken
          PID:4292
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:692
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
        1⤵
          PID:976
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
          1⤵
            PID:428
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
            1⤵
              PID:932
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
              1⤵
                PID:1036
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                1⤵
                  PID:1048
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                  1⤵
                  • Drops file in System32 directory
                  PID:1128
                  • C:\Windows\system32\taskhostw.exe
                    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                    2⤵
                      PID:3132
                    • C:\Windows\system32\MusNotification.exe
                      C:\Windows\system32\MusNotification.exe
                      2⤵
                        PID:4792
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                      1⤵
                      • Indicator Removal: Clear Windows Event Logs
                      PID:1216
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                      1⤵
                        PID:1232
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                        1⤵
                          PID:1344
                        • C:\Windows\System32\svchost.exe
                          C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                          1⤵
                            PID:1360
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                            1⤵
                              PID:1368
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                              1⤵
                                PID:1392
                                • C:\Windows\system32\sihost.exe
                                  sihost.exe
                                  2⤵
                                    PID:3040
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                  1⤵
                                    PID:1420
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                    1⤵
                                      PID:1524
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                      1⤵
                                        PID:1568
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                        1⤵
                                          PID:1660
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                          1⤵
                                            PID:1700
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                            1⤵
                                              PID:1792
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                              1⤵
                                                PID:1840
                                              • C:\Windows\System32\svchost.exe
                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                1⤵
                                                  PID:1856
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                  1⤵
                                                    PID:1868
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                    1⤵
                                                      PID:1948
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                      1⤵
                                                        PID:1972
                                                      • C:\Windows\System32\spoolsv.exe
                                                        C:\Windows\System32\spoolsv.exe
                                                        1⤵
                                                          PID:1468
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                          1⤵
                                                            PID:2072
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                            1⤵
                                                              PID:2228
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                              1⤵
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:2400
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                              1⤵
                                                                PID:2440
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                1⤵
                                                                  PID:2448
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                  1⤵
                                                                  • Drops file in System32 directory
                                                                  • Modifies data under HKEY_USERS
                                                                  PID:2516
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                  1⤵
                                                                  • Enumerates connected drives
                                                                  PID:2564
                                                                • C:\Windows\sysmon.exe
                                                                  C:\Windows\sysmon.exe
                                                                  1⤵
                                                                    PID:2572
                                                                  • C:\Windows\System32\svchost.exe
                                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                    1⤵
                                                                      PID:2584
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                      1⤵
                                                                        PID:2592
                                                                      • C:\Windows\system32\wbem\unsecapp.exe
                                                                        C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                        1⤵
                                                                          PID:2968
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                          1⤵
                                                                            PID:2772
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                            1⤵
                                                                              PID:3164
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                              1⤵
                                                                                PID:3352
                                                                              • C:\Windows\Explorer.EXE
                                                                                C:\Windows\Explorer.EXE
                                                                                1⤵
                                                                                • Modifies registry class
                                                                                • Suspicious behavior: GetForegroundWindowSpam
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                • Suspicious use of FindShellTrayWindow
                                                                                • Suspicious use of SendNotifyMessage
                                                                                • Suspicious use of UnmapMainImage
                                                                                PID:3444
                                                                                • C:\Users\Admin\AppData\Local\Temp\UZI.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\UZI.exe"
                                                                                  2⤵
                                                                                  • Checks computer location settings
                                                                                  • Loads dropped DLL
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:4824
                                                                                  • C:\Users\Admin\AppData\Local\Temp\ajhxf1eg.0mo.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\ajhxf1eg.0mo.exe"
                                                                                    3⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:4620
                                                                                  • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                    "SCHTASKS.exe" /create /tn "MasonUZI.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\UZI.exe'" /sc onlogon /rl HIGHEST
                                                                                    3⤵
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:1400
                                                                                  • C:\Windows\SYSTEM32\SCHTASKS.exe
                                                                                    "SCHTASKS.exe" /create /tn "MasonUZI.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\UZI.exe'" /sc onlogon /rl HIGHEST
                                                                                    3⤵
                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                    PID:3948
                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      4⤵
                                                                                        PID:1316
                                                                                  • C:\Windows\system32\taskmgr.exe
                                                                                    "C:\Windows\system32\taskmgr.exe" /4
                                                                                    2⤵
                                                                                    • Checks SCSI registry key(s)
                                                                                    • Suspicious behavior: GetForegroundWindowSpam
                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                    • Suspicious use of SendNotifyMessage
                                                                                    PID:620
                                                                                  • C:\Windows\system32\taskmgr.exe
                                                                                    "C:\Windows\system32\taskmgr.exe" /4
                                                                                    2⤵
                                                                                      PID:2672
                                                                                    • C:\Windows\system32\taskmgr.exe
                                                                                      "C:\Windows\system32\taskmgr.exe" /4
                                                                                      2⤵
                                                                                        PID:1656
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                      1⤵
                                                                                        PID:3592
                                                                                      • C:\Windows\system32\DllHost.exe
                                                                                        C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                        1⤵
                                                                                          PID:3784
                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                          1⤵
                                                                                            PID:3976
                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                            1⤵
                                                                                            • Suspicious use of UnmapMainImage
                                                                                            PID:4124
                                                                                          • C:\Windows\System32\svchost.exe
                                                                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                            1⤵
                                                                                              PID:1480
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                              1⤵
                                                                                                PID:3184
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                1⤵
                                                                                                  PID:4628
                                                                                                • C:\Windows\system32\SppExtComObj.exe
                                                                                                  C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                  1⤵
                                                                                                    PID:3412
                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                    C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                    1⤵
                                                                                                      PID:4028
                                                                                                    • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                      "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                      1⤵
                                                                                                      • Drops file in System32 directory
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      PID:1652
                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                      1⤵
                                                                                                      • Drops file in System32 directory
                                                                                                      • Modifies data under HKEY_USERS
                                                                                                      PID:2132
                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                      1⤵
                                                                                                        PID:3740
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                        1⤵
                                                                                                          PID:5000
                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                          1⤵
                                                                                                            PID:4564
                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                            1⤵
                                                                                                              PID:2100
                                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                              1⤵
                                                                                                                PID:5104
                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                1⤵
                                                                                                                • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                PID:3792
                                                                                                                • C:\Windows\system32\WerFault.exe
                                                                                                                  C:\Windows\system32\WerFault.exe -pss -s 488 -p 396 -ip 396
                                                                                                                  2⤵
                                                                                                                  • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                                                                  PID:2408
                                                                                                              • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:ShellFeedsUI.AppXnj65k2d1a1rnztt2t2nng5ctmk3e76pn.mca
                                                                                                                1⤵
                                                                                                                  PID:2180
                                                                                                                • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                  C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                  1⤵
                                                                                                                  • Checks BIOS information in registry
                                                                                                                  • Writes to the Master Boot Record (MBR)
                                                                                                                  • Checks SCSI registry key(s)
                                                                                                                  • Enumerates system info in registry
                                                                                                                  • NTFS ADS
                                                                                                                  PID:2288
                                                                                                                • C:\Windows\system32\DllHost.exe
                                                                                                                  C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                                                                                  1⤵
                                                                                                                    PID:272
                                                                                                                  • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                    C:\Windows\System32\WaaSMedicAgent.exe e723163ec8431713387ee4b240fb5fe7 B8oxsRWli02s8d7CCcCStg.0.1.0.0.0
                                                                                                                    1⤵
                                                                                                                    • Sets service image path in registry
                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                    PID:2616
                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                      2⤵
                                                                                                                        PID:4120
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                      1⤵
                                                                                                                      • Drops file in Windows directory
                                                                                                                      PID:4460
                                                                                                                    • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                      C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                      1⤵
                                                                                                                      • Drops file in Windows directory
                                                                                                                      PID:1516
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                      1⤵
                                                                                                                        PID:1380
                                                                                                                      • C:\Windows\System32\mousocoreworker.exe
                                                                                                                        C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                        1⤵
                                                                                                                        • Checks processor information in registry
                                                                                                                        • Enumerates system info in registry
                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                        PID:3048
                                                                                                                      • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                                                                                        C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                                                                                        1⤵
                                                                                                                          PID:1248
                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                          C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
                                                                                                                          1⤵
                                                                                                                            PID:4480
                                                                                                                          • C:\Windows\system32\DllHost.exe
                                                                                                                            C:\Windows\system32\DllHost.exe /Processid:{7966B4D8-4FDC-4126-A10B-39A3209AD251}
                                                                                                                            1⤵
                                                                                                                              PID:3540
                                                                                                                            • C:\Windows\system32\DllHost.exe
                                                                                                                              C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}
                                                                                                                              1⤵
                                                                                                                                PID:3604
                                                                                                                              • C:\Windows\system32\DllHost.exe
                                                                                                                                C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                                                                                                1⤵
                                                                                                                                  PID:3472
                                                                                                                                • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                  C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                  1⤵
                                                                                                                                  • Checks processor information in registry
                                                                                                                                  • NTFS ADS
                                                                                                                                  PID:3172
                                                                                                                                • C:\Windows\System32\mousocoreworker.exe
                                                                                                                                  C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                                  1⤵
                                                                                                                                  • Checks processor information in registry
                                                                                                                                  • Enumerates system info in registry
                                                                                                                                  PID:3188
                                                                                                                                • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                  C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                  1⤵
                                                                                                                                  • Checks processor information in registry
                                                                                                                                  PID:2288

                                                                                                                                Network

                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                Replay Monitor

                                                                                                                                Loading Replay Monitor...

                                                                                                                                Downloads

                                                                                                                                • C:\ProgramData\Microsoft\Windows\WER\Temp\WERC5D0.tmp.csv

                                                                                                                                  Filesize

                                                                                                                                  37KB

                                                                                                                                  MD5

                                                                                                                                  12e86ecefaae066587ccb1199b89df63

                                                                                                                                  SHA1

                                                                                                                                  24fee9c8838483b95bdaba81814cc6a7bf4df8d6

                                                                                                                                  SHA256

                                                                                                                                  26887828c2fbbc944efde08073824652e68b85f0284e535baf4e31513f3364b8

                                                                                                                                  SHA512

                                                                                                                                  0c07fc5050050719de0537d73a8dfd8b6f60ab2da3e462d592738872c1630afa142a5e7b8d484e479029c668cf40d826cadad81ea4cd6fdd78b06ff7a1dbb4df

                                                                                                                                • C:\ProgramData\Microsoft\Windows\WER\Temp\WERC5F1.tmp.txt

                                                                                                                                  Filesize

                                                                                                                                  13KB

                                                                                                                                  MD5

                                                                                                                                  00bc7923f2e5ca2f9b212a31555d0320

                                                                                                                                  SHA1

                                                                                                                                  f8ec0b643bb71330e8e35302743d02dd0c4cfbaf

                                                                                                                                  SHA256

                                                                                                                                  a57f8602a558cad813e6fe889aeafef602ad0d3065a46baca54625009a17e402

                                                                                                                                  SHA512

                                                                                                                                  94b81bd40ea19e05775f55989511ef029d96dead0c4269f3127a8dbcca179c168c427c88661b0b2ed7298864bf3c8e87b8933361b70b4a92217306a55ff872f6

                                                                                                                                • C:\ProgramData\USOPrivate\UpdateStore\store.db

                                                                                                                                  Filesize

                                                                                                                                  60KB

                                                                                                                                  MD5

                                                                                                                                  1b3c7fd9cef6b4cdd8e96f09f3645b1a

                                                                                                                                  SHA1

                                                                                                                                  9aaaa6b2526909d946130516600b57e11effe3b9

                                                                                                                                  SHA256

                                                                                                                                  583901af8f0ae50f1ba1a1d2a5d9fc6bc1bedd964b708d9efd75a9b4dccd7f24

                                                                                                                                  SHA512

                                                                                                                                  18640ff4e34ff10e008b2d92441dfb208d2fdafee8d5a33ec4bfcb5118b92228d3d6593a1c1de1aa50bf9f2bcb85fb47d6700e830a97f556fb356747fab09307

                                                                                                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AppData\Indexed DB\edb.chk

                                                                                                                                  Filesize

                                                                                                                                  8KB

                                                                                                                                  MD5

                                                                                                                                  ed6d57d6778fa926f981ebb288a4fb88

                                                                                                                                  SHA1

                                                                                                                                  2d58c9e675e8236f427ed99c8811b34bb20251b9

                                                                                                                                  SHA256

                                                                                                                                  0de1818e0d77821921b0851679d1c465d1be4bfcb4b082881a65dc9db6c2feea

                                                                                                                                  SHA512

                                                                                                                                  f05620508f4e6229f3d2c7a1834bd5282fa384a4b0374a55f7581eb2c9c7bb8ceef55d108c48d223e7bb437cf67e0608b9e560dda5221934bd43b4c0027fe603

                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\ajhxf1eg.0mo.exe

                                                                                                                                  Filesize

                                                                                                                                  161KB

                                                                                                                                  MD5

                                                                                                                                  94f1ab3a068f83b32639579ec9c5d025

                                                                                                                                  SHA1

                                                                                                                                  38f3d5bc5de46feb8de093d11329766b8e2054ae

                                                                                                                                  SHA256

                                                                                                                                  879cc20b41635709bb304e315aaa5ca4708b480a1bfc2f4935fcf2215188efb0

                                                                                                                                  SHA512

                                                                                                                                  44d5236a804d63302b21ca25ebc148a64605508d03c990a244c44ceb8630849da0510b7b2d0bee72e01ca6681e2d86d7e6aee8847674a26f0028d149b9abee0c

                                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\S-1-5-21-2045521122-590294423-3465680274-1000\Preferred

                                                                                                                                  Filesize

                                                                                                                                  24B

                                                                                                                                  MD5

                                                                                                                                  69578b121326d5b34f321000ff778ee1

                                                                                                                                  SHA1

                                                                                                                                  fa16a399127d5e137679a2375f42b7ea4b61b798

                                                                                                                                  SHA256

                                                                                                                                  c6b3ff526c8b29934112cc8eed70683fe5fa14516ee063dca6a272678ae50b86

                                                                                                                                  SHA512

                                                                                                                                  4561feeecaf72ae82beaed87b42104e43c2d966f228441e5e5968a64e5b88198e9889e17c979d60188f96c698a6f6386efa53137cb45377b696f6631c7c9a7f2

                                                                                                                                • C:\Users\Admin\AppData\Roaming\Orcus\lib_7c04bcf8b3a04c3c8433437cb1b3ce73\SharpDX.DXGI.dll

                                                                                                                                  Filesize

                                                                                                                                  125KB

                                                                                                                                  MD5

                                                                                                                                  2b44c70c49b70d797fbb748158b5d9bb

                                                                                                                                  SHA1

                                                                                                                                  93e00e6527e461c45c7868d14cf05c007e478081

                                                                                                                                  SHA256

                                                                                                                                  3762d43c83af69cd38c9341a927ca6bd00f6bae8217c874d693047d6df4705bf

                                                                                                                                  SHA512

                                                                                                                                  faced62f6ecbfa2ee0d7a47e300302d23030d1f28758cbe9c442e9d8d4f8359c59088aa6237a28103e43d248c8efc7eeaf2c184028701b752df6cce92d6854d0

                                                                                                                                • C:\Users\Admin\AppData\Roaming\Orcus\lib_7c04bcf8b3a04c3c8433437cb1b3ce73\SharpDX.Direct3D11.dll

                                                                                                                                  Filesize

                                                                                                                                  5B

                                                                                                                                  MD5

                                                                                                                                  2a85c26e799957c835631784bd300509

                                                                                                                                  SHA1

                                                                                                                                  11b97075dc3971a6dd5a17a3e79425c7b90d7957

                                                                                                                                  SHA256

                                                                                                                                  5bfb0ab0867043f2e121034cdd842f1c34a6aadf3a02b10efc4dc221121b681b

                                                                                                                                  SHA512

                                                                                                                                  9e503f6d0ebe57e021f551544330bcb25d589fcb2f5a5f4b1578097e82c3cdb0977edeafc867f0210c12ac31691664cd835f291c1e25b12abe747cfd2ab2cce9

                                                                                                                                • C:\Users\Admin\AppData\Roaming\Orcus\lib_7c04bcf8b3a04c3c8433437cb1b3ce73\SharpDX.Direct3D11.dll

                                                                                                                                  Filesize

                                                                                                                                  271KB

                                                                                                                                  MD5

                                                                                                                                  98eb5ba5871acdeaebf3a3b0f64be449

                                                                                                                                  SHA1

                                                                                                                                  c965284f60ef789b00b10b3df60ee682b4497de3

                                                                                                                                  SHA256

                                                                                                                                  d7617d926648849cbfef450b8f48e458ee52e2793fb2251a30094b778aa8848c

                                                                                                                                  SHA512

                                                                                                                                  a60025e304713d333e4b82b2d0be28087950688b049c98d2db5910c00b8d45b92e16d25ac8a58ff1318de019de3a9a00c7cbf8a6ad4b5bb1cb175dafa1b9bea2

                                                                                                                                • C:\Users\Admin\AppData\Roaming\Orcus\lib_7c04bcf8b3a04c3c8433437cb1b3ce73\SharpDX.Direct3D9.dll

                                                                                                                                  Filesize

                                                                                                                                  338KB

                                                                                                                                  MD5

                                                                                                                                  934da0e49208d0881c44fe19d5033840

                                                                                                                                  SHA1

                                                                                                                                  a19c5a822e82e41752a08d3bd9110db19a8a5016

                                                                                                                                  SHA256

                                                                                                                                  02da4af8cd4a8de19d816000caaae885e676b9e52f136ff071a279c2b8ad34c7

                                                                                                                                  SHA512

                                                                                                                                  de62f629c2299b50af62893244a28895d63b78138c8632449984306f45de16bd01076eadbb0d75a700215e970c1df731e202ea640236c0f0da6ed15146193b59

                                                                                                                                • C:\Users\Admin\AppData\Roaming\Orcus\lib_7c04bcf8b3a04c3c8433437cb1b3ce73\SharpDX.dll

                                                                                                                                  Filesize

                                                                                                                                  247KB

                                                                                                                                  MD5

                                                                                                                                  ffb4b61cc11bec6d48226027c2c26704

                                                                                                                                  SHA1

                                                                                                                                  fa8b9e344accbdc4dffa9b5d821d23f0716da29e

                                                                                                                                  SHA256

                                                                                                                                  061542ff3fb36039b7bbffdf3e07b66176b264c1dfd834a14b09c08620717303

                                                                                                                                  SHA512

                                                                                                                                  48aa6130bf1f5bd6de19256bbdf754c0158b43dd122cec47bb801a7a7b56f2da268bfdec24d135621764a23278ead3dcc35911a057e2dfa55a348bae8ef7b8a9

                                                                                                                                • C:\Users\Admin\AppData\Roaming\Orcus\lib_7c04bcf8b3a04c3c8433437cb1b3ce73\TurboJpegWrapper.dll

                                                                                                                                  Filesize

                                                                                                                                  1.3MB

                                                                                                                                  MD5

                                                                                                                                  ac6acc235ebef6374bed71b37e322874

                                                                                                                                  SHA1

                                                                                                                                  a267baad59cd7352167636836bad4b971fcd6b6b

                                                                                                                                  SHA256

                                                                                                                                  047b042cebf4c851f0d14f85f16ce952f03e48c20362d4ed9390875d4900fe96

                                                                                                                                  SHA512

                                                                                                                                  72ac8b8c8f27264cc261297c325d14a0be2084d007c6132ab8402d87f912fe9189cb074db11625d9f86d29a6188f22a89e58ae45c9131fac4522473567017081

                                                                                                                                • C:\Users\Admin\AppData\Roaming\Orcus\lib_7c04bcf8b3a04c3c8433437cb1b3ce73\x64\turbojpeg.dll

                                                                                                                                  Filesize

                                                                                                                                  662KB

                                                                                                                                  MD5

                                                                                                                                  b36cc7f7c7148a783fbed3493bc27954

                                                                                                                                  SHA1

                                                                                                                                  44b39651949a00cf2a5cbba74c3210b980ae81b4

                                                                                                                                  SHA256

                                                                                                                                  c1ce9a872d33fb8757c59b5cd1f26c93b9eeec3e3cf57162c29a0783e6222a38

                                                                                                                                  SHA512

                                                                                                                                  c987c689ecc2cc57350c74ee22b66cb543535bc17b790016ec6407c3d02c539a727f5c38e1451a201e8e7ccfcb4d4639780b6e68cd38b7e67b1b28034ad738a2

                                                                                                                                • C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk

                                                                                                                                  Filesize

                                                                                                                                  8KB

                                                                                                                                  MD5

                                                                                                                                  eebda33e30f765c3e46b078aabf68feb

                                                                                                                                  SHA1

                                                                                                                                  734f59442a2e5986cc7aa854bfaa354b53b3bdb8

                                                                                                                                  SHA256

                                                                                                                                  70e5a47a2a4ed92b38f4545442d30905b348cfcb5e23fe5b91ba4ecd0cd90dd7

                                                                                                                                  SHA512

                                                                                                                                  d105694239275b971ffc0756f0eaf5b81f200684660f113771696b65c3ade27a222a65442d7f06960207124585076f1df1347d0f7b65f240376dfd421322b537

                                                                                                                                • C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred

                                                                                                                                  Filesize

                                                                                                                                  24B

                                                                                                                                  MD5

                                                                                                                                  63df09ad2e7a275d5e007870f15bd7f0

                                                                                                                                  SHA1

                                                                                                                                  14e9a8480035f21ef91e07cf1bfbe9947217a6d0

                                                                                                                                  SHA256

                                                                                                                                  3762144e3095b45006bb2a2be77c8b0a12c0ddd9336ff475d83c8ce2c31647e3

                                                                                                                                  SHA512

                                                                                                                                  8d4bca48be0852909132fff5041c65062f6844aead1dd04d373a0d4c3552989d63affff0baa388eda406f11a7fab32ee491f1df50370498eccb8202547270605

                                                                                                                                • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                                  Filesize

                                                                                                                                  2KB

                                                                                                                                  MD5

                                                                                                                                  8abf2d6067c6f3191a015f84aa9b6efe

                                                                                                                                  SHA1

                                                                                                                                  98f2b0a5cdb13cd3d82dc17bd43741bf0b3496f7

                                                                                                                                  SHA256

                                                                                                                                  ee18bd3259f220c41062abcbe71a421da3e910df11b9f86308a16cdc3a66fbea

                                                                                                                                  SHA512

                                                                                                                                  c2d686a6373efcff583c1ef50c144c59addb8b9c4857ccd8565cd8be3c94b0ac0273945167eb04ebd40dfb0351e4b66cffe4c4e478fb7733714630a11f765b63

                                                                                                                                • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work

                                                                                                                                  Filesize

                                                                                                                                  2KB

                                                                                                                                  MD5

                                                                                                                                  f313c5b4f95605026428425586317353

                                                                                                                                  SHA1

                                                                                                                                  06be66fa06e1cffc54459c38d3d258f46669d01a

                                                                                                                                  SHA256

                                                                                                                                  129d0b993cd3858af5b7e87fdf74d8e59e6f2110184b5c905df8f5f6f2c39d8b

                                                                                                                                  SHA512

                                                                                                                                  b87a829c86eff1d10e1590b18a9909f05101a535e5f4cef914a4192956eb35a8bfef614c9f95d53783d77571687f3eb3c4e8ee2f24d23ad24e0976d8266b8890

                                                                                                                                • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                  Filesize

                                                                                                                                  2KB

                                                                                                                                  MD5

                                                                                                                                  ceb7caa4e9c4b8d760dbf7e9e5ca44c5

                                                                                                                                  SHA1

                                                                                                                                  a3879621f9493414d497ea6d70fbf17e283d5c08

                                                                                                                                  SHA256

                                                                                                                                  98c054088df4957e8d6361fd2539c219bcf35f8a524aad8f5d1a95f218e990e9

                                                                                                                                  SHA512

                                                                                                                                  1eddfbf4cb62d3c5b4755a371316304aaeabb00f01bad03fb4f925a98a2f0824f613537d86deddd648a74d694dc13ed5183e761fdc1ec92589f6fa28beb7fbff

                                                                                                                                • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                  Filesize

                                                                                                                                  2KB

                                                                                                                                  MD5

                                                                                                                                  7d612892b20e70250dbd00d0cdd4f09b

                                                                                                                                  SHA1

                                                                                                                                  63251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5

                                                                                                                                  SHA256

                                                                                                                                  727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02

                                                                                                                                  SHA512

                                                                                                                                  f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1

                                                                                                                                • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                  Filesize

                                                                                                                                  2KB

                                                                                                                                  MD5

                                                                                                                                  1e8e2076314d54dd72e7ee09ff8a52ab

                                                                                                                                  SHA1

                                                                                                                                  5fd0a67671430f66237f483eef39ff599b892272

                                                                                                                                  SHA256

                                                                                                                                  55f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f

                                                                                                                                  SHA512

                                                                                                                                  5b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6

                                                                                                                                • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                  Filesize

                                                                                                                                  2KB

                                                                                                                                  MD5

                                                                                                                                  0b990e24f1e839462c0ac35fef1d119e

                                                                                                                                  SHA1

                                                                                                                                  9e17905f8f68f9ce0a2024d57b537aa8b39c6708

                                                                                                                                  SHA256

                                                                                                                                  a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a

                                                                                                                                  SHA512

                                                                                                                                  c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4

                                                                                                                                • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506

                                                                                                                                  Filesize

                                                                                                                                  328B

                                                                                                                                  MD5

                                                                                                                                  df6a1897acc8a668ed3bd6e6a471e437

                                                                                                                                  SHA1

                                                                                                                                  5f760b900500609ef3d56a511a793dce2a5494c4

                                                                                                                                  SHA256

                                                                                                                                  afdb8c71ec3d3993abafc22d2812119e24370c84e3a65f3393e212a75ee1ed84

                                                                                                                                  SHA512

                                                                                                                                  6057f0b14bd90cc3a8b69f2f9cffdcf595a024c9c48af61193df5b153a9bf51b0dce2870aea7dcbc0d700d6f09f924d825fb280321241678f54303ab6ed2061f

                                                                                                                                • C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749

                                                                                                                                  Filesize

                                                                                                                                  330B

                                                                                                                                  MD5

                                                                                                                                  c02431ec580e71ba9837e01fac561a08

                                                                                                                                  SHA1

                                                                                                                                  d050875a11e562d0d36c5b7f878687c812ff3ba0

                                                                                                                                  SHA256

                                                                                                                                  2829e4830976c441532acf5358aa91c85391dfb340d0130afbec109b87ae0e31

                                                                                                                                  SHA512

                                                                                                                                  f7a5ada5a0c635a0fc7b8d548b294573f84c38035cac88fa49b12dff9c2e3bcdaeea27d52f6312c30b20ed861521a1f82849c8227bf8129213f754e598f02d19

                                                                                                                                • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

                                                                                                                                  Filesize

                                                                                                                                  404B

                                                                                                                                  MD5

                                                                                                                                  856b4f8354711aa475d0ba20cc5c2229

                                                                                                                                  SHA1

                                                                                                                                  13cc34ca82a87ea76ee2991baf805662ce4ae823

                                                                                                                                  SHA256

                                                                                                                                  66022cc962abcfc30d22f43a45dfc6df64e2b3661347171a5618e8354c76ae10

                                                                                                                                  SHA512

                                                                                                                                  55340eee19ecc253484124ab4ecbae84f887fef3349cda6644e9a3510c9d8725beea4b00d008d66d358c3c09907d55360e301219bb9171cfd63394d3c05a7c89

                                                                                                                                • C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9

                                                                                                                                  Filesize

                                                                                                                                  420B

                                                                                                                                  MD5

                                                                                                                                  2608cf7d6d92b4ecc1fec9a31ffbca4f

                                                                                                                                  SHA1

                                                                                                                                  f28961640f11b2f5b6ae19b6ae6fa314f630c403

                                                                                                                                  SHA256

                                                                                                                                  c2cc21319b12db3f0130f0f46bd075ab3c63ec0d3d1043aa31d16ea5592f7b1d

                                                                                                                                  SHA512

                                                                                                                                  c0c706670bb600764aae58bcb4af8ebc523b0397670d120c1264947cc07a4e4740d256b17a8c5149172a1c491f744143d47a5104c9096aa7bbf675656cbf6009

                                                                                                                                • memory/396-27-0x0000027A07150000-0x0000027A0717B000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/396-28-0x00007FFCD48EF000-0x00007FFCD48F0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/396-23-0x0000027A07150000-0x0000027A0717B000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/396-29-0x00007FFCD48EC000-0x00007FFCD48ED000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/428-38-0x0000015218FD0000-0x0000015218FFB000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/428-395-0x0000015218FD0000-0x0000015218FFB000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/428-35-0x0000015218FD0000-0x0000015218FFB000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/428-36-0x00007FFC948D0000-0x00007FFC948E0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/636-13-0x0000014B90560000-0x0000014B90585000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  148KB

                                                                                                                                • memory/636-25-0x00007FFCD48ED000-0x00007FFCD48EE000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  4KB

                                                                                                                                • memory/636-24-0x0000014B90590000-0x0000014B905BB000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/636-15-0x00007FFC948D0000-0x00007FFC948E0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/636-14-0x0000014B90590000-0x0000014B905BB000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/692-19-0x00007FFC948D0000-0x00007FFC948E0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/692-26-0x000001CB830D0000-0x000001CB830FB000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/692-18-0x000001CB830D0000-0x000001CB830FB000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/932-45-0x00007FFC948D0000-0x00007FFC948E0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/932-59-0x000001F1391D0000-0x000001F1391FB000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/932-44-0x000001F1391D0000-0x000001F1391FB000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/932-455-0x000001F1391D0000-0x000001F1391FB000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/976-30-0x0000022A11C40000-0x0000022A11C6B000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/976-31-0x00007FFC948D0000-0x00007FFC948E0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/976-33-0x0000022A11C40000-0x0000022A11C6B000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/976-386-0x0000022A11C40000-0x0000022A11C6B000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/1036-47-0x0000010900AE0000-0x0000010900B0B000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/1036-48-0x00007FFC948D0000-0x00007FFC948E0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/1036-60-0x0000010900AE0000-0x0000010900B0B000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/1036-456-0x0000010900AE0000-0x0000010900B0B000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/1048-50-0x000001CAD2FA0000-0x000001CAD2FCB000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/1048-51-0x00007FFC948D0000-0x00007FFC948E0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/1128-53-0x00000256813C0000-0x00000256813EB000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/1128-54-0x00007FFC948D0000-0x00007FFC948E0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/1216-56-0x0000021F71C30000-0x0000021F71C5B000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/1216-57-0x00007FFC948D0000-0x00007FFC948E0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/1232-65-0x00007FFC948D0000-0x00007FFC948E0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/1232-64-0x00000248FA0B0000-0x00000248FA0DB000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/1344-67-0x0000025B75F90000-0x0000025B75FBB000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/1344-68-0x00007FFC948D0000-0x00007FFC948E0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/1360-70-0x000001A5513D0000-0x000001A5513FB000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  172KB

                                                                                                                                • memory/1360-71-0x00007FFC948D0000-0x00007FFC948E0000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/4620-12-0x00007FFCD3B30000-0x00007FFCD3BEE000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  760KB

                                                                                                                                • memory/4620-11-0x00007FFCD4850000-0x00007FFCD4A45000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  2.0MB

                                                                                                                                • memory/4824-367-0x00007FFCB63E3000-0x00007FFCB63E5000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  8KB

                                                                                                                                • memory/4824-862-0x000001F6A1BD0000-0x000001F6A1C2A000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  360KB

                                                                                                                                • memory/4824-364-0x000001F6A0E10000-0x000001F6A0EF8000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  928KB

                                                                                                                                • memory/4824-368-0x000001F688250000-0x000001F688260000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/4824-370-0x000001F6A0BE0000-0x000001F6A0BEE000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  56KB

                                                                                                                                • memory/4824-369-0x000001F6A0F00000-0x000001F6A0F5C000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  368KB

                                                                                                                                • memory/4824-392-0x000001F6A1AF0000-0x000001F6A1B2C000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  240KB

                                                                                                                                • memory/4824-508-0x000001F688250000-0x000001F688260000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/4824-372-0x000001F6A1820000-0x000001F6A1832000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  72KB

                                                                                                                                • memory/4824-852-0x000001F6A1B30000-0x000001F6A1B74000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  272KB

                                                                                                                                • memory/4824-857-0x000001F6A1B80000-0x000001F6A1BCA000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  296KB

                                                                                                                                • memory/4824-0-0x00007FFCB63E3000-0x00007FFCB63E5000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  8KB

                                                                                                                                • memory/4824-867-0x000001F6A07D0000-0x000001F6A07F6000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  152KB

                                                                                                                                • memory/4824-873-0x000001F6A20F0000-0x000001F6A2244000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  1.3MB

                                                                                                                                • memory/4824-373-0x000001F6A1830000-0x000001F6A1848000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  96KB

                                                                                                                                • memory/4824-374-0x000001F6A1850000-0x000001F6A1860000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  64KB

                                                                                                                                • memory/4824-391-0x000001F6A1A90000-0x000001F6A1AA2000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  72KB

                                                                                                                                • memory/4824-394-0x000001F6A1F20000-0x000001F6A20E2000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  1.8MB

                                                                                                                                • memory/4824-393-0x000001F6A1C40000-0x000001F6A1D4A000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  1.0MB

                                                                                                                                • memory/4824-2-0x000001F688220000-0x000001F68824C000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  176KB

                                                                                                                                • memory/4824-1-0x000001F6864A0000-0x000001F6865BA000-memory.dmp

                                                                                                                                  Filesize

                                                                                                                                  1.1MB