Analysis
-
max time kernel
162s -
max time network
202s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-05-2022 02:29
Static task
static1
Behavioral task
behavioral1
Sample
aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe
Resource
win10v2004-20220414-en
General
-
Target
aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe
-
Size
4.3MB
-
MD5
34fd6dbb11b1cbf0d235612d6747678e
-
SHA1
517cf5249f6245075e1d911a3b539114beb50f71
-
SHA256
aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995
-
SHA512
6e5f0a914f43cf32445e70e01bae4840b2ccb17424b99be83dea39b1649951b2e7854de63d68f6ad16b9668d8e83b0d5f8f05d1769b3327349aa8b18c0dc3918
Malware Config
Extracted
revengerat
NyanCatRevenge
185.81.157.41:5055
73845dcfccd2
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Executes dropped EXE 4 IoCs
Processes:
iAmazon.exeExec.exeExec.exeExec.exepid process 212 iAmazon.exe 448 Exec.exe 1440 Exec.exe 4652 Exec.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Exec.exeExec.exeExec.exeaff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation Exec.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation Exec.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation Exec.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exedescription pid process target process PID 4640 set thread context of 1620 4640 powershell.exe RegAsm.exe PID 4848 set thread context of 4068 4848 powershell.exe RegAsm.exe PID 4712 set thread context of 3696 4712 powershell.exe RegAsm.exe PID 960 set thread context of 3368 960 powershell.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
RegAsm.exepid process 1620 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 4848 powershell.exe 4640 powershell.exe 4292 powershell.exe 4848 powershell.exe 3572 powershell.exe 3572 powershell.exe 4640 powershell.exe 4292 powershell.exe 1804 powershell.exe 4800 powershell.exe 1804 powershell.exe 4800 powershell.exe 4848 powershell.exe 4848 powershell.exe 4848 powershell.exe 4848 powershell.exe 4848 powershell.exe 4712 powershell.exe 4712 powershell.exe 4712 powershell.exe 4712 powershell.exe 960 powershell.exe 960 powershell.exe 4856 powershell.exe 4856 powershell.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeiAmazon.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 4848 powershell.exe Token: SeDebugPrivilege 4640 powershell.exe Token: SeDebugPrivilege 4292 powershell.exe Token: SeDebugPrivilege 3572 powershell.exe Token: SeDebugPrivilege 1804 powershell.exe Token: SeDebugPrivilege 4800 powershell.exe Token: SeDebugPrivilege 212 iAmazon.exe Token: SeDebugPrivilege 4712 powershell.exe Token: SeDebugPrivilege 960 powershell.exe Token: SeDebugPrivilege 4856 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exepowershell.exepowershell.execsc.execsc.exeExec.exepowershell.execsc.exedescription pid process target process PID 1440 wrote to memory of 2840 1440 aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe schtasks.exe PID 1440 wrote to memory of 2840 1440 aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe schtasks.exe PID 1440 wrote to memory of 4848 1440 aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe powershell.exe PID 1440 wrote to memory of 4848 1440 aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe powershell.exe PID 1440 wrote to memory of 4640 1440 aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe powershell.exe PID 1440 wrote to memory of 4640 1440 aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe powershell.exe PID 1440 wrote to memory of 4292 1440 aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe powershell.exe PID 1440 wrote to memory of 4292 1440 aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe powershell.exe PID 1440 wrote to memory of 3572 1440 aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe powershell.exe PID 1440 wrote to memory of 3572 1440 aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe powershell.exe PID 1440 wrote to memory of 1804 1440 aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe powershell.exe PID 1440 wrote to memory of 1804 1440 aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe powershell.exe PID 1440 wrote to memory of 4800 1440 aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe powershell.exe PID 1440 wrote to memory of 4800 1440 aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe powershell.exe PID 1440 wrote to memory of 212 1440 aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe iAmazon.exe PID 1440 wrote to memory of 212 1440 aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe iAmazon.exe PID 1440 wrote to memory of 212 1440 aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe iAmazon.exe PID 4848 wrote to memory of 3576 4848 powershell.exe csc.exe PID 4848 wrote to memory of 3576 4848 powershell.exe csc.exe PID 4640 wrote to memory of 3836 4640 powershell.exe csc.exe PID 4640 wrote to memory of 3836 4640 powershell.exe csc.exe PID 3576 wrote to memory of 2752 3576 csc.exe cvtres.exe PID 3576 wrote to memory of 2752 3576 csc.exe cvtres.exe PID 3836 wrote to memory of 1072 3836 csc.exe cvtres.exe PID 3836 wrote to memory of 1072 3836 csc.exe cvtres.exe PID 4640 wrote to memory of 1620 4640 powershell.exe RegAsm.exe PID 4640 wrote to memory of 1620 4640 powershell.exe RegAsm.exe PID 4640 wrote to memory of 1620 4640 powershell.exe RegAsm.exe PID 4640 wrote to memory of 1620 4640 powershell.exe RegAsm.exe PID 4640 wrote to memory of 1620 4640 powershell.exe RegAsm.exe PID 4640 wrote to memory of 1620 4640 powershell.exe RegAsm.exe PID 4640 wrote to memory of 1620 4640 powershell.exe RegAsm.exe PID 4640 wrote to memory of 1620 4640 powershell.exe RegAsm.exe PID 4848 wrote to memory of 1776 4848 powershell.exe RegAsm.exe PID 4848 wrote to memory of 1776 4848 powershell.exe RegAsm.exe PID 4848 wrote to memory of 1776 4848 powershell.exe RegAsm.exe PID 4848 wrote to memory of 4272 4848 powershell.exe RegAsm.exe PID 4848 wrote to memory of 4272 4848 powershell.exe RegAsm.exe PID 4848 wrote to memory of 4272 4848 powershell.exe RegAsm.exe PID 4848 wrote to memory of 4068 4848 powershell.exe RegAsm.exe PID 4848 wrote to memory of 4068 4848 powershell.exe RegAsm.exe PID 4848 wrote to memory of 4068 4848 powershell.exe RegAsm.exe PID 4848 wrote to memory of 4068 4848 powershell.exe RegAsm.exe PID 4848 wrote to memory of 4068 4848 powershell.exe RegAsm.exe PID 4848 wrote to memory of 4068 4848 powershell.exe RegAsm.exe PID 4848 wrote to memory of 4068 4848 powershell.exe RegAsm.exe PID 4848 wrote to memory of 4068 4848 powershell.exe RegAsm.exe PID 448 wrote to memory of 4712 448 Exec.exe powershell.exe PID 448 wrote to memory of 4712 448 Exec.exe powershell.exe PID 4712 wrote to memory of 3280 4712 powershell.exe csc.exe PID 4712 wrote to memory of 3280 4712 powershell.exe csc.exe PID 3280 wrote to memory of 4840 3280 csc.exe cvtres.exe PID 3280 wrote to memory of 4840 3280 csc.exe cvtres.exe PID 4712 wrote to memory of 1976 4712 powershell.exe RegAsm.exe PID 4712 wrote to memory of 1976 4712 powershell.exe RegAsm.exe PID 4712 wrote to memory of 1976 4712 powershell.exe RegAsm.exe PID 4712 wrote to memory of 3696 4712 powershell.exe RegAsm.exe PID 4712 wrote to memory of 3696 4712 powershell.exe RegAsm.exe PID 4712 wrote to memory of 3696 4712 powershell.exe RegAsm.exe PID 4712 wrote to memory of 3696 4712 powershell.exe RegAsm.exe PID 4712 wrote to memory of 3696 4712 powershell.exe RegAsm.exe PID 4712 wrote to memory of 3696 4712 powershell.exe RegAsm.exe PID 4712 wrote to memory of 3696 4712 powershell.exe RegAsm.exe PID 4712 wrote to memory of 3696 4712 powershell.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe"C:\Users\Admin\AppData\Local\Temp\aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /TN Exec /tr C:\Users\Admin\AppData\Local\Temp\Exec.exe2⤵
- Creates scheduled task(s)
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -ExecutionPolicy Bypass -windowstyle hidden -File C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\Sys32.PS12⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\avpb20mv\avpb20mv.cmdline"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7E77.tmp" "c:\Users\Admin\AppData\Local\Temp\avpb20mv\CSCE9AA76D3E50F4977BF21C2C453D50DB.TMP"4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -ExecutionPolicy Bypass -windowstyle hidden -File C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\CLP.PS12⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cwmgaok5\cwmgaok5.cmdline"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7ED5.tmp" "c:\Users\Admin\AppData\Local\Temp\cwmgaok5\CSC4D20C0CEE8F24DDDB91FB4221652CB.TMP"4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious behavior: AddClipboardFormatListener
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\WindowsUpdate" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\WindowsUpdate" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\iAmazon.exe"C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\iAmazon.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Exec.exeC:\Users\Admin\AppData\Local\Temp\Exec.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -ExecutionPolicy Bypass -windowstyle hidden -File C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\Sys32.PS12⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\dw013elt\dw013elt.cmdline"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESABEF.tmp" "c:\Users\Admin\AppData\Local\Temp\dw013elt\CSCDD559C3E30F942A687AC3718BB3E5F29.TMP"4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\Exec.exeC:\Users\Admin\AppData\Local\Temp\Exec.exe1⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -ExecutionPolicy Bypass -windowstyle hidden -File C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\Sys32.PS12⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uv3h5eo0\uv3h5eo0.cmdline"3⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAC39.tmp" "c:\Users\Admin\AppData\Local\Temp\uv3h5eo0\CSC3FCA6E9EAA434564BAA4D01A7C1ACDD.TMP"4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\Exec.exeC:\Users\Admin\AppData\Local\Temp\Exec.exe1⤵
- Executes dropped EXE
- Checks computer location settings
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -ExecutionPolicy Bypass -windowstyle hidden -File C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\Sys32.PS12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ntv1ifhp\ntv1ifhp.cmdline"3⤵
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7BED.tmp" "c:\Users\Admin\AppData\Local\Temp\ntv1ifhp\CSC466604F11B1041169B1F210ECCD6161.TMP"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Exec.exe.logFilesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.logFilesize
321B
MD508027eeee0542c93662aef98d70095e4
SHA142402c02bf4763fcd6fb0650fc13386f2eae8f9b
SHA2561b9ec007ac8e7de37c61313c5e1b9444df6dc0cd9110553bfa281b13204a646d
SHA512c4e7a17a1dc1f27c91791439d92435a5d750a065508e9539c9af458f21472a7ce45ba0666ef6855a00386e1a75c518d0908b82d929084a1b67ca4c65997a5979
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5a26df49623eff12a70a93f649776dab7
SHA1efb53bd0df3ac34bd119adf8788127ad57e53803
SHA2564ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245
SHA512e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
64B
MD550a8221b93fbd2628ac460dd408a9fc1
SHA17e99fe16a9b14079b6f0316c37cc473e1f83a7e6
SHA25646e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e
SHA51227dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD596ff1ee586a153b4e7ce8661cabc0442
SHA1140d4ff1840cb40601489f3826954386af612136
SHA2560673399a2f37c89d455e8658c4d30b9248bff1ea47ba40957588e2bc862976e8
SHA5123404370d0edb4ead4874ce68525dc9bcbc6008003682646e331bf43a06a24a467ace7eff5be701a822d74c7e065d0f6a0ba0e3d6bc505d34d0189373dcacb569
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD596ff1ee586a153b4e7ce8661cabc0442
SHA1140d4ff1840cb40601489f3826954386af612136
SHA2560673399a2f37c89d455e8658c4d30b9248bff1ea47ba40957588e2bc862976e8
SHA5123404370d0edb4ead4874ce68525dc9bcbc6008003682646e331bf43a06a24a467ace7eff5be701a822d74c7e065d0f6a0ba0e3d6bc505d34d0189373dcacb569
-
C:\Users\Admin\AppData\Local\Temp\Exec.exeFilesize
4KB
MD53cfa7f939c72e8e1d69011e9609ee54b
SHA1eb7af8d25ae63b348c0b665e0d6f2455420fa576
SHA256ed00fbb5f5ca89cd4e81584a6604b689c65f6b16c7f69627a18abac73e70a14f
SHA5128591fc11d697a3eb6d07fdfd0d40e353d25a049480606e0653cf3a036ede5f5229d69f3bde30b5dfec6d193b5d7d4df33f4e08e678d46b23eae1c95ceef3f0e7
-
C:\Users\Admin\AppData\Local\Temp\Exec.exeFilesize
4KB
MD53cfa7f939c72e8e1d69011e9609ee54b
SHA1eb7af8d25ae63b348c0b665e0d6f2455420fa576
SHA256ed00fbb5f5ca89cd4e81584a6604b689c65f6b16c7f69627a18abac73e70a14f
SHA5128591fc11d697a3eb6d07fdfd0d40e353d25a049480606e0653cf3a036ede5f5229d69f3bde30b5dfec6d193b5d7d4df33f4e08e678d46b23eae1c95ceef3f0e7
-
C:\Users\Admin\AppData\Local\Temp\Exec.exeFilesize
4KB
MD53cfa7f939c72e8e1d69011e9609ee54b
SHA1eb7af8d25ae63b348c0b665e0d6f2455420fa576
SHA256ed00fbb5f5ca89cd4e81584a6604b689c65f6b16c7f69627a18abac73e70a14f
SHA5128591fc11d697a3eb6d07fdfd0d40e353d25a049480606e0653cf3a036ede5f5229d69f3bde30b5dfec6d193b5d7d4df33f4e08e678d46b23eae1c95ceef3f0e7
-
C:\Users\Admin\AppData\Local\Temp\Exec.exeFilesize
4KB
MD53cfa7f939c72e8e1d69011e9609ee54b
SHA1eb7af8d25ae63b348c0b665e0d6f2455420fa576
SHA256ed00fbb5f5ca89cd4e81584a6604b689c65f6b16c7f69627a18abac73e70a14f
SHA5128591fc11d697a3eb6d07fdfd0d40e353d25a049480606e0653cf3a036ede5f5229d69f3bde30b5dfec6d193b5d7d4df33f4e08e678d46b23eae1c95ceef3f0e7
-
C:\Users\Admin\AppData\Local\Temp\RES7E77.tmpFilesize
1KB
MD5b46fc0314b737ff63680f7c00e389a76
SHA1a266e78f2d62f5fc100c1fed4e347a097a672ea5
SHA256b43ddc0e641ab58168fab6f47bc5226b962a3cdaf8fd9a5952a3c28cd6ba5a97
SHA5120a90e3a2bc70fb3067d7bde771d89f6f037cc074c9f9aa923051966619702f699ad4d367ae32597f46ee629c11a7adcf055421614f5d0656de9a60e4f2face90
-
C:\Users\Admin\AppData\Local\Temp\RES7ED5.tmpFilesize
1KB
MD511503c07851c56d8b16b5308380a66f3
SHA1506ebd6985891236737d8a0bdbde8b19f3863e86
SHA2567cbd9967a8768fc71d5be33cc72f4903a6c8d88aef357b4094a9444a0a2f9a4a
SHA512e3e2b2ba8cc2a9e5297c37ea375b8ec58d071d52692fb15b2c64313e3e299c8d9338e8a1314f0b3395d86ac7130fe91e6904d6a5d4370bbe1bdf9f9147588e1b
-
C:\Users\Admin\AppData\Local\Temp\RESABEF.tmpFilesize
1KB
MD561a737c4b6f59fdf66cd9e7c2ec7b841
SHA14b8d47da5b26def386860e9729acf03c77f1d27f
SHA256606f0b5700630968affe29230b7c7315d094b47baddf3b1083b04aeedd6b8e7f
SHA5124077421100ca180247e0d4c7618f7dc635cbfa4e5b8d4426d8b4466720e8f66479b28402b05f2dee151ac560a1d84bedf780c97a561a715b45ee9578e68c5b37
-
C:\Users\Admin\AppData\Local\Temp\RESAC39.tmpFilesize
1KB
MD515e50e25d633539d7f2b57466a3834f8
SHA10da647dae3a75361b0566f0550115e894340f246
SHA2564a1c9b042708abebfc26d5c7a68418e06b7bd663cc0877f7525810803d225c55
SHA5127b5c80fba697721bc1fb64ccdad1a6cb575c406047f95b7e8fbeb825b53e8d02cea374ee4c94e2dee8d86ed11f76b4261541d1b3434368a458d3a290a39d1a96
-
C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\CLP.PS1Filesize
81KB
MD5dd89352a77b2032e1f2bbfc458573525
SHA114208f50e67217f0396996da1e8e68be40171591
SHA256d36911b3311d4d5603335c534622f1ca96c5181ab82e49fc90146e7806c49a52
SHA5129d14b75650334c6e054e550cccfcfb4f7a77393227e59979bbccea2d4aa679b5a34638dc23bb19e94a772072649be4a591b4c93aa869dcc9326825f3d22f3009
-
C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\Sys32.PS1Filesize
120KB
MD5716ed1eb9f6360328e92030d98496a46
SHA11ed50ee40df7602a1adae5c4c763bc2a30033c2a
SHA256ac2c566783be636007299a27e8f3e79d2bc2d5931150ac5b6bc7aa031b9e4d4f
SHA512e2c1a1012f1f1241dee507fb8c1a46bf16d297d7692e77efb77ef04c6658e5499f5cc925a53436aad842ae76c86bcab3115274d57d9b5dcf892f1194f1f09ae7
-
C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\iAmazon.exeFilesize
2.8MB
MD5d1030184711310725a604d31173362cc
SHA1dc4b1c4b10361e322a6226f3f1e0f1121f0a9593
SHA25673cd2bde631726e737fcdbd54b596ff3c39acce30caaf4181a2f32277955dd08
SHA5123effff70c9f576406fa231c516c8917c7019675a253bd9bdfef88e7f048c1f77b77229795dbb4f83760f08fff5323e0b854e54a8b9730003865996f970acbc94
-
C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\iAmazon.exeFilesize
2.8MB
MD5d1030184711310725a604d31173362cc
SHA1dc4b1c4b10361e322a6226f3f1e0f1121f0a9593
SHA25673cd2bde631726e737fcdbd54b596ff3c39acce30caaf4181a2f32277955dd08
SHA5123effff70c9f576406fa231c516c8917c7019675a253bd9bdfef88e7f048c1f77b77229795dbb4f83760f08fff5323e0b854e54a8b9730003865996f970acbc94
-
C:\Users\Admin\AppData\Local\Temp\avpb20mv\avpb20mv.dllFilesize
9KB
MD5c41835389dd8c82606fdd6f837786a19
SHA17d8ca41f7588e57c6b253aa96cb992a445753c4a
SHA256435de3bd832c76eeeb6e7f4f2c8ea179806566757bcbdbda8464d01c0cfd678d
SHA5122f9fb9609174a4e70e228ef6f579c1be5d7458daa1fdbf9850961215f6608aff12a91362afb66497c5696154ab2a3264dce3a675bf44a9ffd0a48bdc3e6946c8
-
C:\Users\Admin\AppData\Local\Temp\cwmgaok5\cwmgaok5.dllFilesize
9KB
MD5eb0c5b0990be23cb067c3671d0de2fd7
SHA1d8f33130a192b02ab0e8ecdde81f152844c09eda
SHA2568c1db63cf944a9d3be43f88bd6a32bcb680df1e7200af6051e1cad69d4535354
SHA5122793c6be605e314d89247ffb32f9857f02c4a865d9ad2222f9a27ee7fd5d8808753a7272fbf98c63bdac330c1c0ac6f6f94996008ca4e25a483d6f63ccad4b6b
-
C:\Users\Admin\AppData\Local\Temp\dw013elt\dw013elt.dllFilesize
9KB
MD579a95191253694a428ee070a5d644033
SHA1089e232bc697fbe84f6731a9dca140302ddc3b04
SHA256946a77e41180a36ce27fb9812a16766a7fb5a765c0d3f55946ffc563484e4db5
SHA5126fe0f652dba27461ee2f9b08ab7b079e798c2136008ace9b9f6adb2924119c04f5e573727eff07c4f1103907292f20195c036da41bc1a4134c61ba77ca1973c9
-
C:\Users\Admin\AppData\Local\Temp\uv3h5eo0\uv3h5eo0.dllFilesize
9KB
MD552b2976a7cea2a4c31454c9f027e2bf1
SHA148d2b4a8213b36316afacad457211833ebdd904a
SHA2566abfe0e2182d6c98f4204a6b1f7b755c9d2840d0f9ee09279d36a5fda9561822
SHA51217d3e647a61c5493b2722d0ff81b4e59de4599760c226b93f8cc3f1e7497ac649413cb870959456cf163a76757b773642ad47ebeb712d21d4e77a09fbb502a1a
-
\??\c:\Users\Admin\AppData\Local\Temp\avpb20mv\CSCE9AA76D3E50F4977BF21C2C453D50DB.TMPFilesize
652B
MD509c734070d3e5a779e03776eebfc881c
SHA179df655641979740b40fb627c57aea2e5cba9be1
SHA256d5cd0bbdc3f9e08e907e49a74445493324e4114f287a918500b1556b9a09b363
SHA51200b9faf64cc8338e6b76019899f502af956196991ff8b4213efda9d21e6d7dd69478879008b6780b2ace655801c7f749590ecc6a0deed18a3d0e253e980839ba
-
\??\c:\Users\Admin\AppData\Local\Temp\avpb20mv\avpb20mv.0.csFilesize
17KB
MD57a3de43d349b7582a2d897183d26b322
SHA10145f5d6aa0d8bcd6b2bcdb9a17be08042699877
SHA256aa3ce1c0e59c08dbe0af96d1e96948658c50efd5e998aa7f8cf60219938348d6
SHA5128d9df1a39c0e58318bddd82f19e0cd7e45e78bbf86ec7f329394d4ef8a2fcb203dd71abe85a987ba021fdc640a07a4053aea7e4a34453d21f85cb197c57cd962
-
\??\c:\Users\Admin\AppData\Local\Temp\avpb20mv\avpb20mv.cmdlineFilesize
300B
MD5ea5e8e8c616e84b73a75d07a3960ff14
SHA16d1f2294653b918a1120844f8cd6f30e001defe8
SHA25607320d4ebfe457cfee3c168a4ae908f4498f73b048adabab0ed8217703db15e1
SHA512487ead38bcc3355b21e07391723fcb8b68fbcc17decc0f4901bbc9e70dddfa4950e2d167203876002a750f43252e3ab5f3a15a71f9de71f818562534faa9bca6
-
\??\c:\Users\Admin\AppData\Local\Temp\cwmgaok5\CSC4D20C0CEE8F24DDDB91FB4221652CB.TMPFilesize
652B
MD5b8b77f50abdab0c66e311116d90ee920
SHA166e19fffc689991364bb9eabbe385b91555e70d6
SHA256cde7b82be01bd9d2ab30eabe1bf80e8a3c740460dc362840c96db43e39c82740
SHA51241f81f98cfbc9f947702bf87df86b2b8ea2f917e01a2ec7cf8113f1924c836b9ba1320978ba34d10d07bfea8e8de9a22c371fbfc67f126d4786730ecbc445c49
-
\??\c:\Users\Admin\AppData\Local\Temp\cwmgaok5\cwmgaok5.0.csFilesize
17KB
MD57a3de43d349b7582a2d897183d26b322
SHA10145f5d6aa0d8bcd6b2bcdb9a17be08042699877
SHA256aa3ce1c0e59c08dbe0af96d1e96948658c50efd5e998aa7f8cf60219938348d6
SHA5128d9df1a39c0e58318bddd82f19e0cd7e45e78bbf86ec7f329394d4ef8a2fcb203dd71abe85a987ba021fdc640a07a4053aea7e4a34453d21f85cb197c57cd962
-
\??\c:\Users\Admin\AppData\Local\Temp\cwmgaok5\cwmgaok5.cmdlineFilesize
300B
MD58487bfd9cd7bf11937f238debb2e14b7
SHA1cd19dbace094411e0ce575587129510c85cc63ea
SHA256e4bb2a475e9718cade28e560b3b8bd281453e75ce4f0bb12f136e6c4253c67b0
SHA5127288c8f2b6f38a3e6e7bae6d62e57929bdfee50fd0d023d8ee9d919a6a7123d1c9c54a169e8e140b10801ae028da5ede6d42abe2589d33ad8a4856d046b216d7
-
\??\c:\Users\Admin\AppData\Local\Temp\dw013elt\CSCDD559C3E30F942A687AC3718BB3E5F29.TMPFilesize
652B
MD5842ceb951190a3069ade41116bf4f590
SHA1eb70f9a3c7c4cb26c9d43ad4b5a04f528eec2d66
SHA2565dcd2987a81307f26eeaae735ab90a8f53079df5e1d3995781f43b88af4df6aa
SHA5125556cd6af71a253222146d60e2e4afe893e05d0a43fc6d5c770a225993e63058ff6b25792f4e0be0690ebe91f4962f55281f7c96f4f3fa527e413d1888fb673f
-
\??\c:\Users\Admin\AppData\Local\Temp\dw013elt\dw013elt.0.csFilesize
17KB
MD57a3de43d349b7582a2d897183d26b322
SHA10145f5d6aa0d8bcd6b2bcdb9a17be08042699877
SHA256aa3ce1c0e59c08dbe0af96d1e96948658c50efd5e998aa7f8cf60219938348d6
SHA5128d9df1a39c0e58318bddd82f19e0cd7e45e78bbf86ec7f329394d4ef8a2fcb203dd71abe85a987ba021fdc640a07a4053aea7e4a34453d21f85cb197c57cd962
-
\??\c:\Users\Admin\AppData\Local\Temp\dw013elt\dw013elt.cmdlineFilesize
300B
MD5c1bca5ab2f300bee53830620e9ee7cc0
SHA1fc732dd84d70dc288b5737ddbe23a6157e86e0a4
SHA25635edada04448594a756ec06558fe63da41235068ba4c190f49ba33c8c0f13274
SHA5125500e4cf93a3ec51210fcce3ae8acac89e75da6f34ae1da5a4f10aeae01ff03232b07436114ceee25a5daed3250b7df0e36634395b1da44dbfc3938753a60ac7
-
\??\c:\Users\Admin\AppData\Local\Temp\ntv1ifhp\CSC466604F11B1041169B1F210ECCD6161.TMPFilesize
652B
MD592c6090a8526a883712e659746acccfa
SHA17c033572be9a14825df6ecb95d1c7c17df6bacdd
SHA2562484c4f523f1468777772eaa2330306f95dfcf56bae2619513c9193adb8ca91a
SHA512bc382ed987adc20024a92581ee194f035687249fd09d35ef9e944adc6b00d9dd0d1467ebc6600a48f7344cf806796981e37503a322e967e6b204818310970443
-
\??\c:\Users\Admin\AppData\Local\Temp\ntv1ifhp\ntv1ifhp.0.csFilesize
17KB
MD57a3de43d349b7582a2d897183d26b322
SHA10145f5d6aa0d8bcd6b2bcdb9a17be08042699877
SHA256aa3ce1c0e59c08dbe0af96d1e96948658c50efd5e998aa7f8cf60219938348d6
SHA5128d9df1a39c0e58318bddd82f19e0cd7e45e78bbf86ec7f329394d4ef8a2fcb203dd71abe85a987ba021fdc640a07a4053aea7e4a34453d21f85cb197c57cd962
-
\??\c:\Users\Admin\AppData\Local\Temp\ntv1ifhp\ntv1ifhp.cmdlineFilesize
300B
MD5f97a3440a4195e652ac3314dea69d9c4
SHA10e5f6defe026087c64ef802865a04498f6ef478a
SHA256cb629fa81a6eff7df26d670540091f0e21e962b01e48247c8ff2043fefc021c9
SHA5125a6155407e29ef6a28fc98b13e430eb8dd10cc1c486d1846268ff34651d0c49a8cfc13c7ce20a0cb38407f5fbe469dbb12aedb82aa4909ce582fb63c6b565390
-
\??\c:\Users\Admin\AppData\Local\Temp\uv3h5eo0\CSC3FCA6E9EAA434564BAA4D01A7C1ACDD.TMPFilesize
652B
MD5a2a9e01c1a55ec52037862c2a95ac908
SHA1a1ac8e4cd3e00f147b3ba4a0099e6d7a720cffe6
SHA25641cfea9fa300f853209931168389ecde9f63af843ce45ed521042d83ccd36c9d
SHA5121d36190e3faf07d8fa7d72f29ac6d99a8ff1ae7945847d54c90593a45cca9fda96b7955b094cdb0c37b2b1bde088e7647c1356454703f38557de8b426132a564
-
\??\c:\Users\Admin\AppData\Local\Temp\uv3h5eo0\uv3h5eo0.0.csFilesize
17KB
MD57a3de43d349b7582a2d897183d26b322
SHA10145f5d6aa0d8bcd6b2bcdb9a17be08042699877
SHA256aa3ce1c0e59c08dbe0af96d1e96948658c50efd5e998aa7f8cf60219938348d6
SHA5128d9df1a39c0e58318bddd82f19e0cd7e45e78bbf86ec7f329394d4ef8a2fcb203dd71abe85a987ba021fdc640a07a4053aea7e4a34453d21f85cb197c57cd962
-
\??\c:\Users\Admin\AppData\Local\Temp\uv3h5eo0\uv3h5eo0.cmdlineFilesize
300B
MD5740ed4c03492a4224a8e3abe1c45d6ad
SHA11777205cd555d7589e7e38fa35cf25ec130638e3
SHA2560ed71c7898bd03bac1e7e10a76766c63b70c32785d09b0e42d4755d29157d044
SHA512e16ed125e01ce5ab0f5e1d1a7f3376999a4cee174c58ec1689e1b829e8f0dceacb115493b9dd94c02ee22ed3e59bed443cbd80fbe02c003dae50363d315bf735
-
memory/212-149-0x0000000000000000-mapping.dmp
-
memory/212-177-0x0000000005740000-0x00000000057D2000-memory.dmpFilesize
584KB
-
memory/212-155-0x0000000000A00000-0x0000000000CC8000-memory.dmpFilesize
2.8MB
-
memory/212-172-0x0000000005CF0000-0x0000000006294000-memory.dmpFilesize
5.6MB
-
memory/212-178-0x00000000056E0000-0x00000000056EA000-memory.dmpFilesize
40KB
-
memory/448-181-0x0000000000EB0000-0x0000000000EB8000-memory.dmpFilesize
32KB
-
memory/448-183-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmpFilesize
10.8MB
-
memory/960-197-0x0000000000000000-mapping.dmp
-
memory/960-200-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmpFilesize
10.8MB
-
memory/1072-165-0x0000000000000000-mapping.dmp
-
memory/1440-130-0x0000000000FB0000-0x0000000001402000-memory.dmpFilesize
4.3MB
-
memory/1440-198-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmpFilesize
10.8MB
-
memory/1440-131-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmpFilesize
10.8MB
-
memory/1620-173-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/1620-174-0x0000000000403186-mapping.dmp
-
memory/1764-218-0x0000000000000000-mapping.dmp
-
memory/1804-148-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmpFilesize
10.8MB
-
memory/1804-138-0x0000000000000000-mapping.dmp
-
memory/2556-215-0x0000000000000000-mapping.dmp
-
memory/2752-164-0x0000000000000000-mapping.dmp
-
memory/2840-132-0x0000000000000000-mapping.dmp
-
memory/3280-185-0x0000000000000000-mapping.dmp
-
memory/3368-209-0x0000000000404F6E-mapping.dmp
-
memory/3572-147-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmpFilesize
10.8MB
-
memory/3572-136-0x0000000000000000-mapping.dmp
-
memory/3576-156-0x0000000000000000-mapping.dmp
-
memory/3696-193-0x0000000000404F6E-mapping.dmp
-
memory/3836-157-0x0000000000000000-mapping.dmp
-
memory/4068-176-0x0000000000404F6E-mapping.dmp
-
memory/4068-175-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/4292-144-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmpFilesize
10.8MB
-
memory/4292-135-0x0000000000000000-mapping.dmp
-
memory/4640-145-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmpFilesize
10.8MB
-
memory/4640-140-0x0000017525600000-0x0000017525644000-memory.dmpFilesize
272KB
-
memory/4640-134-0x0000000000000000-mapping.dmp
-
memory/4652-213-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmpFilesize
10.8MB
-
memory/4688-204-0x0000000000000000-mapping.dmp
-
memory/4712-182-0x0000000000000000-mapping.dmp
-
memory/4712-184-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmpFilesize
10.8MB
-
memory/4800-139-0x0000000000000000-mapping.dmp
-
memory/4800-151-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmpFilesize
10.8MB
-
memory/4840-188-0x0000000000000000-mapping.dmp
-
memory/4848-143-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmpFilesize
10.8MB
-
memory/4848-133-0x0000000000000000-mapping.dmp
-
memory/4848-137-0x000001B7F0790000-0x000001B7F07B2000-memory.dmpFilesize
136KB
-
memory/4848-153-0x000001B7F1AA0000-0x000001B7F1B16000-memory.dmpFilesize
472KB
-
memory/4856-214-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmpFilesize
10.8MB
-
memory/4856-212-0x0000000000000000-mapping.dmp
-
memory/5012-201-0x0000000000000000-mapping.dmp