Analysis
-
max time kernel
12s -
max time network
129s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
12-07-2021 15:02
Static task
static1
Behavioral task
behavioral1
Sample
Product Emm 803030830019971 10082982820091989 109938377338393.exe
Resource
win7v20210410
General
-
Target
Product Emm 803030830019971 10082982820091989 109938377338393.exe
-
Size
17KB
-
MD5
728961a48344fe5a70b1e3018e44c117
-
SHA1
4a9445a76f3d5b8713446dd98e9d5941a9f02b19
-
SHA256
e7b067c6a4b7ebf676eebc9b60c80be110c607e681220cce63675ba95068fa84
-
SHA512
4365af4884c40f047d826e81e4e9d09b138daccbdec53da5152d2b5261a0af6d352af2ad6a72e9b1d399664938f0f5cddb4f298e96b621ef1eb80943dac770b4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
ލޛޝޘމݘލ.exepid process 3500 ލޛޝޘމݘލ.exe -
Drops startup file 2 IoCs
Processes:
Product Emm 803030830019971 10082982820091989 109938377338393.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ލޛޝޘމݘލ.exe Product Emm 803030830019971 10082982820091989 109938377338393.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ލޛޝޘމݘލ.exe Product Emm 803030830019971 10082982820091989 109938377338393.exe -
Processes:
Product Emm 803030830019971 10082982820091989 109938377338393.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths Product Emm 803030830019971 10082982820091989 109938377338393.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions Product Emm 803030830019971 10082982820091989 109938377338393.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\Product Emm 803030830019971 10082982820091989 109938377338393.exe = "0" Product Emm 803030830019971 10082982820091989 109938377338393.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ލޛޝޘމݘލ.exe = "0" Product Emm 803030830019971 10082982820091989 109938377338393.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Public\Documents\\svchost.exe = "0" Product Emm 803030830019971 10082982820091989 109938377338393.exe -
Processes:
Product Emm 803030830019971 10082982820091989 109938377338393.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Product Emm 803030830019971 10082982820091989 109938377338393.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Product Emm 803030830019971 10082982820091989 109938377338393.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 216 powershell.exe 2284 powershell.exe 1328 powershell.exe 3252 powershell.exe 3884 powershell.exe 3172 powershell.exe 2284 powershell.exe 1828 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
Product Emm 803030830019971 10082982820091989 109938377338393.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe Token: SeDebugPrivilege 216 powershell.exe Token: SeDebugPrivilege 1328 powershell.exe Token: SeDebugPrivilege 2284 powershell.exe Token: SeDebugPrivilege 3252 powershell.exe Token: SeDebugPrivilege 3884 powershell.exe Token: SeDebugPrivilege 1828 powershell.exe Token: SeDebugPrivilege 3172 powershell.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
Product Emm 803030830019971 10082982820091989 109938377338393.exeލޛޝޘމݘލ.exedescription pid process target process PID 908 wrote to memory of 3252 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe powershell.exe PID 908 wrote to memory of 3252 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe powershell.exe PID 908 wrote to memory of 3252 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe powershell.exe PID 908 wrote to memory of 216 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe powershell.exe PID 908 wrote to memory of 216 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe powershell.exe PID 908 wrote to memory of 216 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe powershell.exe PID 908 wrote to memory of 2284 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe powershell.exe PID 908 wrote to memory of 2284 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe powershell.exe PID 908 wrote to memory of 2284 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe powershell.exe PID 908 wrote to memory of 1328 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe powershell.exe PID 908 wrote to memory of 1328 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe powershell.exe PID 908 wrote to memory of 1328 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe powershell.exe PID 908 wrote to memory of 3500 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe ލޛޝޘމݘލ.exe PID 908 wrote to memory of 3500 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe ލޛޝޘމݘލ.exe PID 908 wrote to memory of 3500 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe ލޛޝޘމݘލ.exe PID 908 wrote to memory of 3884 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe powershell.exe PID 908 wrote to memory of 3884 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe powershell.exe PID 908 wrote to memory of 3884 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe powershell.exe PID 908 wrote to memory of 1828 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe powershell.exe PID 908 wrote to memory of 1828 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe powershell.exe PID 908 wrote to memory of 1828 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe powershell.exe PID 908 wrote to memory of 3172 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe powershell.exe PID 908 wrote to memory of 3172 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe powershell.exe PID 908 wrote to memory of 3172 908 Product Emm 803030830019971 10082982820091989 109938377338393.exe powershell.exe PID 3500 wrote to memory of 4156 3500 ލޛޝޘމݘލ.exe powershell.exe PID 3500 wrote to memory of 4156 3500 ލޛޝޘމݘލ.exe powershell.exe PID 3500 wrote to memory of 4156 3500 ލޛޝޘމݘލ.exe powershell.exe PID 3500 wrote to memory of 4240 3500 ލޛޝޘމݘލ.exe powershell.exe PID 3500 wrote to memory of 4240 3500 ލޛޝޘމݘލ.exe powershell.exe PID 3500 wrote to memory of 4240 3500 ލޛޝޘމݘލ.exe powershell.exe PID 3500 wrote to memory of 4320 3500 ލޛޝޘމݘލ.exe powershell.exe PID 3500 wrote to memory of 4320 3500 ލޛޝޘމݘލ.exe powershell.exe PID 3500 wrote to memory of 4320 3500 ލޛޝޘމݘލ.exe powershell.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
Product Emm 803030830019971 10082982820091989 109938377338393.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Product Emm 803030830019971 10082982820091989 109938377338393.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Product Emm 803030830019971 10082982820091989 109938377338393.exe"C:\Users\Admin\AppData\Local\Temp\Product Emm 803030830019971 10082982820091989 109938377338393.exe"1⤵
- Drops startup file
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Product Emm 803030830019971 10082982820091989 109938377338393.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ލޛޝޘމݘލ.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ލޛޝޘމݘލ.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Product Emm 803030830019971 10082982820091989 109938377338393.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ލޛޝޘމݘލ.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ލޛޝޘމݘލ.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ލޛޝޘމݘލ.exe" -Force3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\\svchost.exe" -Force3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ލޛޝޘމݘލ.exe" -Force3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\\svchost.exe" -Force3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\\svchost.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Product Emm 803030830019971 10082982820091989 109938377338393.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\Documents\\svchost.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Product Emm 803030830019971 10082982820091989 109938377338393.exe"C:\Users\Admin\AppData\Local\Temp\Product Emm 803030830019971 10082982820091989 109938377338393.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
71f1cd7681a0b887f835e3aadeea7767
SHA1f784f0ff4b999ddfa59633e592aba8736763bf50
SHA256f01aec7092ba6bdab328a091b414002487ae38c51df0917ffe57bc1254d11a42
SHA512450d9ac3236ce36625d0a6585f9ee0bf430c2899f77211ba79d1dd23c070d9323d3a2c91673d44988f896e1b549d839f147148ac474cad9111714cf98cd56064
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
71f1cd7681a0b887f835e3aadeea7767
SHA1f784f0ff4b999ddfa59633e592aba8736763bf50
SHA256f01aec7092ba6bdab328a091b414002487ae38c51df0917ffe57bc1254d11a42
SHA512450d9ac3236ce36625d0a6585f9ee0bf430c2899f77211ba79d1dd23c070d9323d3a2c91673d44988f896e1b549d839f147148ac474cad9111714cf98cd56064
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
71f1cd7681a0b887f835e3aadeea7767
SHA1f784f0ff4b999ddfa59633e592aba8736763bf50
SHA256f01aec7092ba6bdab328a091b414002487ae38c51df0917ffe57bc1254d11a42
SHA512450d9ac3236ce36625d0a6585f9ee0bf430c2899f77211ba79d1dd23c070d9323d3a2c91673d44988f896e1b549d839f147148ac474cad9111714cf98cd56064
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
71f1cd7681a0b887f835e3aadeea7767
SHA1f784f0ff4b999ddfa59633e592aba8736763bf50
SHA256f01aec7092ba6bdab328a091b414002487ae38c51df0917ffe57bc1254d11a42
SHA512450d9ac3236ce36625d0a6585f9ee0bf430c2899f77211ba79d1dd23c070d9323d3a2c91673d44988f896e1b549d839f147148ac474cad9111714cf98cd56064
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
71f1cd7681a0b887f835e3aadeea7767
SHA1f784f0ff4b999ddfa59633e592aba8736763bf50
SHA256f01aec7092ba6bdab328a091b414002487ae38c51df0917ffe57bc1254d11a42
SHA512450d9ac3236ce36625d0a6585f9ee0bf430c2899f77211ba79d1dd23c070d9323d3a2c91673d44988f896e1b549d839f147148ac474cad9111714cf98cd56064
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
71f1cd7681a0b887f835e3aadeea7767
SHA1f784f0ff4b999ddfa59633e592aba8736763bf50
SHA256f01aec7092ba6bdab328a091b414002487ae38c51df0917ffe57bc1254d11a42
SHA512450d9ac3236ce36625d0a6585f9ee0bf430c2899f77211ba79d1dd23c070d9323d3a2c91673d44988f896e1b549d839f147148ac474cad9111714cf98cd56064
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
71f1cd7681a0b887f835e3aadeea7767
SHA1f784f0ff4b999ddfa59633e592aba8736763bf50
SHA256f01aec7092ba6bdab328a091b414002487ae38c51df0917ffe57bc1254d11a42
SHA512450d9ac3236ce36625d0a6585f9ee0bf430c2899f77211ba79d1dd23c070d9323d3a2c91673d44988f896e1b549d839f147148ac474cad9111714cf98cd56064
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
71f1cd7681a0b887f835e3aadeea7767
SHA1f784f0ff4b999ddfa59633e592aba8736763bf50
SHA256f01aec7092ba6bdab328a091b414002487ae38c51df0917ffe57bc1254d11a42
SHA512450d9ac3236ce36625d0a6585f9ee0bf430c2899f77211ba79d1dd23c070d9323d3a2c91673d44988f896e1b549d839f147148ac474cad9111714cf98cd56064
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
71f1cd7681a0b887f835e3aadeea7767
SHA1f784f0ff4b999ddfa59633e592aba8736763bf50
SHA256f01aec7092ba6bdab328a091b414002487ae38c51df0917ffe57bc1254d11a42
SHA512450d9ac3236ce36625d0a6585f9ee0bf430c2899f77211ba79d1dd23c070d9323d3a2c91673d44988f896e1b549d839f147148ac474cad9111714cf98cd56064
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
71f1cd7681a0b887f835e3aadeea7767
SHA1f784f0ff4b999ddfa59633e592aba8736763bf50
SHA256f01aec7092ba6bdab328a091b414002487ae38c51df0917ffe57bc1254d11a42
SHA512450d9ac3236ce36625d0a6585f9ee0bf430c2899f77211ba79d1dd23c070d9323d3a2c91673d44988f896e1b549d839f147148ac474cad9111714cf98cd56064
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
71f1cd7681a0b887f835e3aadeea7767
SHA1f784f0ff4b999ddfa59633e592aba8736763bf50
SHA256f01aec7092ba6bdab328a091b414002487ae38c51df0917ffe57bc1254d11a42
SHA512450d9ac3236ce36625d0a6585f9ee0bf430c2899f77211ba79d1dd23c070d9323d3a2c91673d44988f896e1b549d839f147148ac474cad9111714cf98cd56064
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
6faff0ebd7c3554b8b1b66bdc7a8ed7f
SHA1cc38cfcd0b4265eb2200f105c9ae46b3809beb72
SHA256b5cf2e1865f49c705491963f07bbf48cd3a863e42e73c7f84b99e3edca282c3a
SHA512ab424cc9603699a5285b75527892cd20ca3209cc01c4191171e7463d149434bd877c5b2a34443bc44e7502b58e35e2ecafd56bfef8f5d496e2aea2037f7b439d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
6faff0ebd7c3554b8b1b66bdc7a8ed7f
SHA1cc38cfcd0b4265eb2200f105c9ae46b3809beb72
SHA256b5cf2e1865f49c705491963f07bbf48cd3a863e42e73c7f84b99e3edca282c3a
SHA512ab424cc9603699a5285b75527892cd20ca3209cc01c4191171e7463d149434bd877c5b2a34443bc44e7502b58e35e2ecafd56bfef8f5d496e2aea2037f7b439d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
6faff0ebd7c3554b8b1b66bdc7a8ed7f
SHA1cc38cfcd0b4265eb2200f105c9ae46b3809beb72
SHA256b5cf2e1865f49c705491963f07bbf48cd3a863e42e73c7f84b99e3edca282c3a
SHA512ab424cc9603699a5285b75527892cd20ca3209cc01c4191171e7463d149434bd877c5b2a34443bc44e7502b58e35e2ecafd56bfef8f5d496e2aea2037f7b439d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
6faff0ebd7c3554b8b1b66bdc7a8ed7f
SHA1cc38cfcd0b4265eb2200f105c9ae46b3809beb72
SHA256b5cf2e1865f49c705491963f07bbf48cd3a863e42e73c7f84b99e3edca282c3a
SHA512ab424cc9603699a5285b75527892cd20ca3209cc01c4191171e7463d149434bd877c5b2a34443bc44e7502b58e35e2ecafd56bfef8f5d496e2aea2037f7b439d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
6faff0ebd7c3554b8b1b66bdc7a8ed7f
SHA1cc38cfcd0b4265eb2200f105c9ae46b3809beb72
SHA256b5cf2e1865f49c705491963f07bbf48cd3a863e42e73c7f84b99e3edca282c3a
SHA512ab424cc9603699a5285b75527892cd20ca3209cc01c4191171e7463d149434bd877c5b2a34443bc44e7502b58e35e2ecafd56bfef8f5d496e2aea2037f7b439d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
6faff0ebd7c3554b8b1b66bdc7a8ed7f
SHA1cc38cfcd0b4265eb2200f105c9ae46b3809beb72
SHA256b5cf2e1865f49c705491963f07bbf48cd3a863e42e73c7f84b99e3edca282c3a
SHA512ab424cc9603699a5285b75527892cd20ca3209cc01c4191171e7463d149434bd877c5b2a34443bc44e7502b58e35e2ecafd56bfef8f5d496e2aea2037f7b439d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
6faff0ebd7c3554b8b1b66bdc7a8ed7f
SHA1cc38cfcd0b4265eb2200f105c9ae46b3809beb72
SHA256b5cf2e1865f49c705491963f07bbf48cd3a863e42e73c7f84b99e3edca282c3a
SHA512ab424cc9603699a5285b75527892cd20ca3209cc01c4191171e7463d149434bd877c5b2a34443bc44e7502b58e35e2ecafd56bfef8f5d496e2aea2037f7b439d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
6faff0ebd7c3554b8b1b66bdc7a8ed7f
SHA1cc38cfcd0b4265eb2200f105c9ae46b3809beb72
SHA256b5cf2e1865f49c705491963f07bbf48cd3a863e42e73c7f84b99e3edca282c3a
SHA512ab424cc9603699a5285b75527892cd20ca3209cc01c4191171e7463d149434bd877c5b2a34443bc44e7502b58e35e2ecafd56bfef8f5d496e2aea2037f7b439d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
6faff0ebd7c3554b8b1b66bdc7a8ed7f
SHA1cc38cfcd0b4265eb2200f105c9ae46b3809beb72
SHA256b5cf2e1865f49c705491963f07bbf48cd3a863e42e73c7f84b99e3edca282c3a
SHA512ab424cc9603699a5285b75527892cd20ca3209cc01c4191171e7463d149434bd877c5b2a34443bc44e7502b58e35e2ecafd56bfef8f5d496e2aea2037f7b439d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
6faff0ebd7c3554b8b1b66bdc7a8ed7f
SHA1cc38cfcd0b4265eb2200f105c9ae46b3809beb72
SHA256b5cf2e1865f49c705491963f07bbf48cd3a863e42e73c7f84b99e3edca282c3a
SHA512ab424cc9603699a5285b75527892cd20ca3209cc01c4191171e7463d149434bd877c5b2a34443bc44e7502b58e35e2ecafd56bfef8f5d496e2aea2037f7b439d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
101343244d619fd29dc007b34351865b
SHA1a721bf0ee99f24b3e6c263033cfa02a63d4175cc
SHA256286038573287d04ce980461054d2377b71ab4eb8a37e466b38d120ad7f93a043
SHA5121a40055b9e2186d142059ab12afc82a21767f9fbfe98345be40f67619d128fb261f6afef74b25ba52b8f80480bb86e06006047de1b9505d5a65f7d7ee3ce0209
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
101343244d619fd29dc007b34351865b
SHA1a721bf0ee99f24b3e6c263033cfa02a63d4175cc
SHA256286038573287d04ce980461054d2377b71ab4eb8a37e466b38d120ad7f93a043
SHA5121a40055b9e2186d142059ab12afc82a21767f9fbfe98345be40f67619d128fb261f6afef74b25ba52b8f80480bb86e06006047de1b9505d5a65f7d7ee3ce0209
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
101343244d619fd29dc007b34351865b
SHA1a721bf0ee99f24b3e6c263033cfa02a63d4175cc
SHA256286038573287d04ce980461054d2377b71ab4eb8a37e466b38d120ad7f93a043
SHA5121a40055b9e2186d142059ab12afc82a21767f9fbfe98345be40f67619d128fb261f6afef74b25ba52b8f80480bb86e06006047de1b9505d5a65f7d7ee3ce0209
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
101343244d619fd29dc007b34351865b
SHA1a721bf0ee99f24b3e6c263033cfa02a63d4175cc
SHA256286038573287d04ce980461054d2377b71ab4eb8a37e466b38d120ad7f93a043
SHA5121a40055b9e2186d142059ab12afc82a21767f9fbfe98345be40f67619d128fb261f6afef74b25ba52b8f80480bb86e06006047de1b9505d5a65f7d7ee3ce0209
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
101343244d619fd29dc007b34351865b
SHA1a721bf0ee99f24b3e6c263033cfa02a63d4175cc
SHA256286038573287d04ce980461054d2377b71ab4eb8a37e466b38d120ad7f93a043
SHA5121a40055b9e2186d142059ab12afc82a21767f9fbfe98345be40f67619d128fb261f6afef74b25ba52b8f80480bb86e06006047de1b9505d5a65f7d7ee3ce0209
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
101343244d619fd29dc007b34351865b
SHA1a721bf0ee99f24b3e6c263033cfa02a63d4175cc
SHA256286038573287d04ce980461054d2377b71ab4eb8a37e466b38d120ad7f93a043
SHA5121a40055b9e2186d142059ab12afc82a21767f9fbfe98345be40f67619d128fb261f6afef74b25ba52b8f80480bb86e06006047de1b9505d5a65f7d7ee3ce0209
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
4f365e64b0da4b5d6ecc2749b1d6ebce
SHA1cef4eb4974901a2b6d4d0afc8ae177baabaf6be8
SHA256e96eda6432b5bc8bf8a43cf18b8e9a1258e80c6a993e9bbba0ea7e8fb6dd376f
SHA512db3aa400b8bdc5a652cd540f5cd89bb435a84d69ee9c8cadd176b9f97c2ef09e617f1ed67155a1976ff04abdcdc7edcd7c22839e8276da045f0d5c7ec23dcccf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
101343244d619fd29dc007b34351865b
SHA1a721bf0ee99f24b3e6c263033cfa02a63d4175cc
SHA256286038573287d04ce980461054d2377b71ab4eb8a37e466b38d120ad7f93a043
SHA5121a40055b9e2186d142059ab12afc82a21767f9fbfe98345be40f67619d128fb261f6afef74b25ba52b8f80480bb86e06006047de1b9505d5a65f7d7ee3ce0209
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
101343244d619fd29dc007b34351865b
SHA1a721bf0ee99f24b3e6c263033cfa02a63d4175cc
SHA256286038573287d04ce980461054d2377b71ab4eb8a37e466b38d120ad7f93a043
SHA5121a40055b9e2186d142059ab12afc82a21767f9fbfe98345be40f67619d128fb261f6afef74b25ba52b8f80480bb86e06006047de1b9505d5a65f7d7ee3ce0209
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
101343244d619fd29dc007b34351865b
SHA1a721bf0ee99f24b3e6c263033cfa02a63d4175cc
SHA256286038573287d04ce980461054d2377b71ab4eb8a37e466b38d120ad7f93a043
SHA5121a40055b9e2186d142059ab12afc82a21767f9fbfe98345be40f67619d128fb261f6afef74b25ba52b8f80480bb86e06006047de1b9505d5a65f7d7ee3ce0209
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
07b13878d5de0af2a554727c6cc2a26f
SHA1372631dfdfa7ef1522fa66651db8cd7a81f8a03d
SHA256b826c8b274da399304637e4d6143d13c25c961c2e2f8bfa95f48c84a1fc2cdbd
SHA5122b39ee002481949bf4e589a8dd2b47180f1de01456de8125981aef45d4009d57192e828c51d3ebc5e6a0c4bdb6171e994984f61b5361a7a94b5ebf52dc2ac56b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
2a8b66a5c58bf225e2daffcf39b40199
SHA15da96840178012856f25a081eae0d37f578e7947
SHA25689b494f8f19b14d15a89d005f01f6a8c97eee81f63e5f2602d10e63583d402e8
SHA512c291607db0da8c343a596f179749322fc9592a1fc5d79c348c8b3e3339c3069dd243a20d5b0ff4f2aa0952ec18d8b84c4825fd94faa14e7ed72eae3a22ef44cd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
edb23bd0ac2495f1b9b7d022df9ee3c8
SHA1e28d672d34fd5821e098389c35945495245d9956
SHA25603a55db9cf9a728398aec5de0e3c2f818b63986b96274519868faebdc7dd2139
SHA512d668b939edf4b1ace04c2c8ff5f9c1dd052def1ff794c331971b8f9f609671f16141a73433c91b77fbaca2923795e1746e8d33485a2958ac3e381277923ec0c9
-
C:\Users\Admin\AppData\Local\Temp\031a559e2e3c46298d62dd0fd619b9c9MD5
27e4b98a9ccf6e9d14fb527d29337776
SHA16e3e19996c1e1be97a067e71e5a7b2ef8957948b
SHA256a924949bb396dfcc1a3e99c66e2b71ba0f9a9d4d943c90619c6a7774625d038c
SHA512572bf0f8a476edcc19c8a1617715b651461f8743f2ff385d2df97569d6c704f66deb3ee644f61341cd7391c1eb89ec3fb2c053c8913161c9ca3fe5ce58ca4008
-
C:\Users\Admin\AppData\Local\Temp\9e0038ecbdf546609e1d6a8fe18ad968MD5
a5e987dd12064883c589870fc20cc1d1
SHA1465b0163fc4f178ba82139d642db2a2dee92c794
SHA256631a5f1d6147d40f1b31bbddb226495f94f82d4daccbe7a0d66b2eccd46dc8c0
SHA512640246f409af61688a932137cdc0dd0c41b3f7ed9253ca307cdf717a026664942169ff83ca3aef5c1aee7ba3dbeac4a0b789cd58d5114eb486d6da703c8e5c39
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ލޛޝޘމݘލ.exeMD5
728961a48344fe5a70b1e3018e44c117
SHA14a9445a76f3d5b8713446dd98e9d5941a9f02b19
SHA256e7b067c6a4b7ebf676eebc9b60c80be110c607e681220cce63675ba95068fa84
SHA5124365af4884c40f047d826e81e4e9d09b138daccbdec53da5152d2b5261a0af6d352af2ad6a72e9b1d399664938f0f5cddb4f298e96b621ef1eb80943dac770b4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ލޛޝޘމݘލ.exeMD5
728961a48344fe5a70b1e3018e44c117
SHA14a9445a76f3d5b8713446dd98e9d5941a9f02b19
SHA256e7b067c6a4b7ebf676eebc9b60c80be110c607e681220cce63675ba95068fa84
SHA5124365af4884c40f047d826e81e4e9d09b138daccbdec53da5152d2b5261a0af6d352af2ad6a72e9b1d399664938f0f5cddb4f298e96b621ef1eb80943dac770b4
-
memory/216-403-0x00000000048E3000-0x00000000048E4000-memory.dmpFilesize
4KB
-
memory/216-152-0x00000000048E0000-0x00000000048E1000-memory.dmpFilesize
4KB
-
memory/216-162-0x00000000048E2000-0x00000000048E3000-memory.dmpFilesize
4KB
-
memory/216-357-0x000000007F3B0000-0x000000007F3B1000-memory.dmpFilesize
4KB
-
memory/216-137-0x00000000072B0000-0x00000000072B1000-memory.dmpFilesize
4KB
-
memory/216-124-0x0000000000000000-mapping.dmp
-
memory/908-120-0x00000000061F0000-0x00000000061F1000-memory.dmpFilesize
4KB
-
memory/908-183-0x0000000005DB0000-0x0000000005DB1000-memory.dmpFilesize
4KB
-
memory/908-116-0x00000000050E0000-0x00000000050E1000-memory.dmpFilesize
4KB
-
memory/908-117-0x0000000002C30000-0x0000000002C31000-memory.dmpFilesize
4KB
-
memory/908-118-0x0000000005BF0000-0x0000000005BF1000-memory.dmpFilesize
4KB
-
memory/908-114-0x0000000000770000-0x0000000000771000-memory.dmpFilesize
4KB
-
memory/908-119-0x0000000005C90000-0x0000000005CE1000-memory.dmpFilesize
324KB
-
memory/908-121-0x0000000005DD0000-0x0000000005DD1000-memory.dmpFilesize
4KB
-
memory/908-122-0x0000000005F10000-0x0000000005F11000-memory.dmpFilesize
4KB
-
memory/1328-399-0x00000000048B3000-0x00000000048B4000-memory.dmpFilesize
4KB
-
memory/1328-184-0x0000000007190000-0x0000000007191000-memory.dmpFilesize
4KB
-
memory/1328-130-0x0000000000000000-mapping.dmp
-
memory/1328-194-0x0000000007B70000-0x0000000007B71000-memory.dmpFilesize
4KB
-
memory/1328-189-0x00000000072A0000-0x00000000072A1000-memory.dmpFilesize
4KB
-
memory/1328-172-0x00000000048B0000-0x00000000048B1000-memory.dmpFilesize
4KB
-
memory/1328-186-0x0000000007230000-0x0000000007231000-memory.dmpFilesize
4KB
-
memory/1328-175-0x00000000048B2000-0x00000000048B3000-memory.dmpFilesize
4KB
-
memory/1328-318-0x000000007E480000-0x000000007E481000-memory.dmpFilesize
4KB
-
memory/1828-432-0x000000007E960000-0x000000007E961000-memory.dmpFilesize
4KB
-
memory/1828-178-0x0000000007372000-0x0000000007373000-memory.dmpFilesize
4KB
-
memory/1828-174-0x0000000007370000-0x0000000007371000-memory.dmpFilesize
4KB
-
memory/1828-543-0x0000000007373000-0x0000000007374000-memory.dmpFilesize
4KB
-
memory/1828-151-0x0000000000000000-mapping.dmp
-
memory/2284-216-0x0000000007BB0000-0x0000000007BB1000-memory.dmpFilesize
4KB
-
memory/2284-167-0x0000000006AE0000-0x0000000006AE1000-memory.dmpFilesize
4KB
-
memory/2284-395-0x0000000006AE3000-0x0000000006AE4000-memory.dmpFilesize
4KB
-
memory/2284-221-0x0000000007F30000-0x0000000007F31000-memory.dmpFilesize
4KB
-
memory/2284-322-0x000000007ED60000-0x000000007ED61000-memory.dmpFilesize
4KB
-
memory/2284-126-0x0000000000000000-mapping.dmp
-
memory/2284-170-0x0000000006AE2000-0x0000000006AE3000-memory.dmpFilesize
4KB
-
memory/3172-206-0x0000000006F52000-0x0000000006F53000-memory.dmpFilesize
4KB
-
memory/3172-160-0x0000000000000000-mapping.dmp
-
memory/3172-560-0x0000000006F53000-0x0000000006F54000-memory.dmpFilesize
4KB
-
memory/3172-437-0x000000007F090000-0x000000007F091000-memory.dmpFilesize
4KB
-
memory/3172-204-0x0000000006F50000-0x0000000006F51000-memory.dmpFilesize
4KB
-
memory/3252-153-0x0000000003100000-0x0000000003101000-memory.dmpFilesize
4KB
-
memory/3252-158-0x0000000003102000-0x0000000003103000-memory.dmpFilesize
4KB
-
memory/3252-131-0x0000000004810000-0x0000000004811000-memory.dmpFilesize
4KB
-
memory/3252-123-0x0000000000000000-mapping.dmp
-
memory/3252-401-0x0000000003103000-0x0000000003104000-memory.dmpFilesize
4KB
-
memory/3252-351-0x000000007F660000-0x000000007F661000-memory.dmpFilesize
4KB
-
memory/3500-156-0x0000000005820000-0x0000000005821000-memory.dmpFilesize
4KB
-
memory/3500-134-0x0000000000000000-mapping.dmp
-
memory/3884-161-0x0000000007070000-0x0000000007071000-memory.dmpFilesize
4KB
-
memory/3884-145-0x0000000000000000-mapping.dmp
-
memory/3884-164-0x0000000007072000-0x0000000007073000-memory.dmpFilesize
4KB
-
memory/3884-565-0x0000000007073000-0x0000000007074000-memory.dmpFilesize
4KB
-
memory/3884-440-0x000000007EE00000-0x000000007EE01000-memory.dmpFilesize
4KB
-
memory/4156-648-0x0000000000A03000-0x0000000000A04000-memory.dmpFilesize
4KB
-
memory/4156-527-0x000000007F520000-0x000000007F521000-memory.dmpFilesize
4KB
-
memory/4156-228-0x0000000000A00000-0x0000000000A01000-memory.dmpFilesize
4KB
-
memory/4156-233-0x0000000000A02000-0x0000000000A03000-memory.dmpFilesize
4KB
-
memory/4156-201-0x0000000000000000-mapping.dmp
-
memory/4240-235-0x0000000006B90000-0x0000000006B91000-memory.dmpFilesize
4KB
-
memory/4240-752-0x0000000006B93000-0x0000000006B94000-memory.dmpFilesize
4KB
-
memory/4240-551-0x000000007F170000-0x000000007F171000-memory.dmpFilesize
4KB
-
memory/4240-203-0x0000000000000000-mapping.dmp
-
memory/4240-230-0x0000000006B92000-0x0000000006B93000-memory.dmpFilesize
4KB
-
memory/4320-240-0x0000000004310000-0x0000000004311000-memory.dmpFilesize
4KB
-
memory/4320-536-0x000000007EE10000-0x000000007EE11000-memory.dmpFilesize
4KB
-
memory/4320-250-0x0000000004312000-0x0000000004313000-memory.dmpFilesize
4KB
-
memory/4320-212-0x0000000000000000-mapping.dmp
-
memory/4320-804-0x0000000004313000-0x0000000004314000-memory.dmpFilesize
4KB
-
memory/4416-598-0x000000007EAC0000-0x000000007EAC1000-memory.dmpFilesize
4KB
-
memory/4416-251-0x0000000006C10000-0x0000000006C11000-memory.dmpFilesize
4KB
-
memory/4416-742-0x0000000006C13000-0x0000000006C14000-memory.dmpFilesize
4KB
-
memory/4416-254-0x0000000006C12000-0x0000000006C13000-memory.dmpFilesize
4KB
-
memory/4416-217-0x0000000000000000-mapping.dmp