Analysis
-
max time kernel
171s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 21:17
Static task
static1
Behavioral task
behavioral1
Sample
a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe
Resource
win10v2004-20221111-en
General
-
Target
a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe
-
Size
602KB
-
MD5
2f32e20d4785dea1a2133f549870984f
-
SHA1
e5cb50dd4eebfe13817f8ede54609141287ff591
-
SHA256
a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec
-
SHA512
d728f7b1c525f6798b9d7e4e500f082e253badfa99940a11d3d49e523384276a6336b763714840ae4b07cf077e14167bd10746058ad4d99192d5de4c98855a08
-
SSDEEP
12288:3AGFRlwXdvLaZqA15h+xdZ4Ts0njQrbuOC8f4+GOOrU/PU6MZ7rn:AvL6qA17EZD0kHumLOA/PUT7T
Malware Config
Signatures
-
Drops file in Windows directory 4 IoCs
Processes:
a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exedescription ioc process File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cch.new a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cch.new a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exedescription pid process Token: SeDebugPrivilege 2300 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: 33 2300 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeIncBasePriorityPrivilege 2300 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeDebugPrivilege 1860 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: 33 1860 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeIncBasePriorityPrivilege 1860 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeDebugPrivilege 1004 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: 33 1004 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeIncBasePriorityPrivilege 1004 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeDebugPrivilege 1564 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: 33 1564 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeIncBasePriorityPrivilege 1564 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeDebugPrivilege 1824 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: 33 1824 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeIncBasePriorityPrivilege 1824 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeDebugPrivilege 4828 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: 33 4828 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeIncBasePriorityPrivilege 4828 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeDebugPrivilege 2760 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: 33 2760 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeIncBasePriorityPrivilege 2760 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeDebugPrivilege 4688 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: 33 4688 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeIncBasePriorityPrivilege 4688 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeDebugPrivilege 2492 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: 33 2492 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeIncBasePriorityPrivilege 2492 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeDebugPrivilege 2192 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: 33 2192 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeIncBasePriorityPrivilege 2192 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeDebugPrivilege 2712 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: 33 2712 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeIncBasePriorityPrivilege 2712 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeDebugPrivilege 2076 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: 33 2076 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeIncBasePriorityPrivilege 2076 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeDebugPrivilege 2264 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: 33 2264 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeIncBasePriorityPrivilege 2264 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeDebugPrivilege 360 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: 33 360 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeIncBasePriorityPrivilege 360 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeDebugPrivilege 2600 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: 33 2600 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeIncBasePriorityPrivilege 2600 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeDebugPrivilege 4152 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: 33 4152 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeIncBasePriorityPrivilege 4152 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeDebugPrivilege 4912 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: 33 4912 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeIncBasePriorityPrivilege 4912 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeDebugPrivilege 3204 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: 33 3204 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeIncBasePriorityPrivilege 3204 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeDebugPrivilege 972 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: 33 972 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeIncBasePriorityPrivilege 972 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeDebugPrivilege 4064 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: 33 4064 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeIncBasePriorityPrivilege 4064 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeDebugPrivilege 3304 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: 33 3304 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeIncBasePriorityPrivilege 3304 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe Token: SeDebugPrivilege 1472 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exea480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exedescription pid process target process PID 2300 wrote to memory of 1860 2300 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 2300 wrote to memory of 1860 2300 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 1860 wrote to memory of 1004 1860 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 1860 wrote to memory of 1004 1860 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 1004 wrote to memory of 1564 1004 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 1004 wrote to memory of 1564 1004 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 1564 wrote to memory of 1824 1564 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 1564 wrote to memory of 1824 1564 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 1824 wrote to memory of 4828 1824 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 1824 wrote to memory of 4828 1824 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 4828 wrote to memory of 2760 4828 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 4828 wrote to memory of 2760 4828 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 2760 wrote to memory of 4688 2760 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 2760 wrote to memory of 4688 2760 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 4688 wrote to memory of 2492 4688 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 4688 wrote to memory of 2492 4688 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 2492 wrote to memory of 2192 2492 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 2492 wrote to memory of 2192 2492 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 2192 wrote to memory of 2712 2192 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 2192 wrote to memory of 2712 2192 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 2712 wrote to memory of 2076 2712 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 2712 wrote to memory of 2076 2712 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 2076 wrote to memory of 2264 2076 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 2076 wrote to memory of 2264 2076 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 2264 wrote to memory of 360 2264 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 2264 wrote to memory of 360 2264 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 360 wrote to memory of 2600 360 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 360 wrote to memory of 2600 360 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 2600 wrote to memory of 4152 2600 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 2600 wrote to memory of 4152 2600 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 4152 wrote to memory of 4912 4152 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 4152 wrote to memory of 4912 4152 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 4912 wrote to memory of 3204 4912 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 4912 wrote to memory of 3204 4912 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 3204 wrote to memory of 972 3204 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 3204 wrote to memory of 972 3204 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 972 wrote to memory of 4064 972 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 972 wrote to memory of 4064 972 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 4064 wrote to memory of 3304 4064 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 4064 wrote to memory of 3304 4064 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 3304 wrote to memory of 1472 3304 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 3304 wrote to memory of 1472 3304 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 1472 wrote to memory of 5020 1472 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 1472 wrote to memory of 5020 1472 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 5020 wrote to memory of 4248 5020 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 5020 wrote to memory of 4248 5020 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 4248 wrote to memory of 3628 4248 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 4248 wrote to memory of 3628 4248 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 3628 wrote to memory of 4320 3628 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 3628 wrote to memory of 4320 3628 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 4320 wrote to memory of 1352 4320 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 4320 wrote to memory of 1352 4320 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 1352 wrote to memory of 4336 1352 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 1352 wrote to memory of 4336 1352 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 4336 wrote to memory of 3604 4336 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 4336 wrote to memory of 3604 4336 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 3604 wrote to memory of 1672 3604 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 3604 wrote to memory of 1672 3604 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 1672 wrote to memory of 4236 1672 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 1672 wrote to memory of 4236 1672 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 4236 wrote to memory of 3032 4236 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 4236 wrote to memory of 3032 4236 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 3032 wrote to memory of 4212 3032 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe PID 3032 wrote to memory of 4212 3032 a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe"C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe3⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe6⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe7⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe8⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe9⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe10⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe11⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe12⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe13⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe14⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe15⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe16⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe17⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe18⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe19⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe20⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe21⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe22⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe23⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe24⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe25⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe26⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe27⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe28⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe29⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe30⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe31⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe32⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe33⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe34⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe35⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe36⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe37⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe38⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe39⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe40⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe41⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe42⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe43⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe44⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe45⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe46⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe47⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe48⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe49⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe50⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe51⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe52⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe53⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe54⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe55⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe56⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe57⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe58⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe59⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe60⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe61⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe62⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe63⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe64⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe65⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe66⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe67⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe68⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe69⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe70⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe71⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe72⤵
-
C:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exeC:\Users\Admin\AppData\Local\Temp\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe73⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\a480a45725ed05e73779e4b91eda7a837c0605e59c1041d41eafec0a42b07eec.exe.logFilesize
493B
MD524a5aa19a470a73157ff2070f87f5318
SHA14a00ea888e875b0d7d908981f83e70831555b212
SHA256f1b67b7f443b689aba972849e7e01ff27bbf1fadbdde1e522622e3043b593fdc
SHA51266f49e247cc3a77bbc734a2cf542f1e4179e0b9c4be0719222ce84d08b53485fa8ee9396904665e3f99b5d554240b65d01d09499479f0a877dafb965e91ed183
-
C:\Users\Admin\AppData\Roaming\Microsoft\CLR Security Config\v2.0.50727.312\64bit\security.config.cchFilesize
514B
MD5072984a2519f1a5ad8802d289002f191
SHA144b0a54e7b94d8b5eef9439c19b61a1b8eb198fa
SHA2568df09764d13d142d8a164932a750b9b28904edc4ef2feb4426600d810fdbacaf
SHA512e574fb851420b3f56a136f7f315fe4d5919aa5a741de0555189322cdef33fe50a75b3ef21a951de2219f1aa0386f0b1232e2094f3f024c8a87ed755d359ecac0
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\enterprisesec.config.cchFilesize
514B
MD5072984a2519f1a5ad8802d289002f191
SHA144b0a54e7b94d8b5eef9439c19b61a1b8eb198fa
SHA2568df09764d13d142d8a164932a750b9b28904edc4ef2feb4426600d810fdbacaf
SHA512e574fb851420b3f56a136f7f315fe4d5919aa5a741de0555189322cdef33fe50a75b3ef21a951de2219f1aa0386f0b1232e2094f3f024c8a87ed755d359ecac0
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\config\security.config.cchFilesize
514B
MD5072984a2519f1a5ad8802d289002f191
SHA144b0a54e7b94d8b5eef9439c19b61a1b8eb198fa
SHA2568df09764d13d142d8a164932a750b9b28904edc4ef2feb4426600d810fdbacaf
SHA512e574fb851420b3f56a136f7f315fe4d5919aa5a741de0555189322cdef33fe50a75b3ef21a951de2219f1aa0386f0b1232e2094f3f024c8a87ed755d359ecac0
-
memory/220-255-0x0000000000000000-mapping.dmp
-
memory/220-256-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/360-161-0x0000000000000000-mapping.dmp
-
memory/360-162-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/940-220-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/940-219-0x0000000000000000-mapping.dmp
-
memory/972-172-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/972-171-0x0000000000000000-mapping.dmp
-
memory/1004-137-0x00007FFF2AC90000-0x00007FFF2B6C6000-memory.dmpFilesize
10.2MB
-
memory/1004-136-0x0000000000000000-mapping.dmp
-
memory/1216-215-0x0000000000000000-mapping.dmp
-
memory/1216-216-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/1352-188-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/1352-187-0x0000000000000000-mapping.dmp
-
memory/1472-177-0x0000000000000000-mapping.dmp
-
memory/1472-178-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/1504-221-0x0000000000000000-mapping.dmp
-
memory/1504-222-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/1564-142-0x00007FFF2AC90000-0x00007FFF2B6C6000-memory.dmpFilesize
10.2MB
-
memory/1564-138-0x0000000000000000-mapping.dmp
-
memory/1568-240-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/1568-239-0x0000000000000000-mapping.dmp
-
memory/1672-194-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/1672-193-0x0000000000000000-mapping.dmp
-
memory/1824-144-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/1824-143-0x0000000000000000-mapping.dmp
-
memory/1860-135-0x00007FFF2AC90000-0x00007FFF2B6C6000-memory.dmpFilesize
10.2MB
-
memory/1860-133-0x0000000000000000-mapping.dmp
-
memory/1884-247-0x0000000000000000-mapping.dmp
-
memory/1884-248-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/1968-259-0x0000000000000000-mapping.dmp
-
memory/1968-260-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/2076-157-0x0000000000000000-mapping.dmp
-
memory/2076-158-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/2080-246-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/2080-245-0x0000000000000000-mapping.dmp
-
memory/2192-153-0x0000000000000000-mapping.dmp
-
memory/2192-154-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/2264-160-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/2264-159-0x0000000000000000-mapping.dmp
-
memory/2300-132-0x00007FFF2AC90000-0x00007FFF2B6C6000-memory.dmpFilesize
10.2MB
-
memory/2352-238-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/2352-237-0x0000000000000000-mapping.dmp
-
memory/2492-210-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/2492-209-0x0000000000000000-mapping.dmp
-
memory/2492-151-0x0000000000000000-mapping.dmp
-
memory/2492-152-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/2600-163-0x0000000000000000-mapping.dmp
-
memory/2600-164-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/2712-155-0x0000000000000000-mapping.dmp
-
memory/2712-156-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/2760-148-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/2760-147-0x0000000000000000-mapping.dmp
-
memory/3032-198-0x00007FFF29420000-0x00007FFF29E56000-memory.dmpFilesize
10.2MB
-
memory/3032-197-0x0000000000000000-mapping.dmp
-
memory/3068-263-0x0000000000000000-mapping.dmp
-
memory/3180-217-0x0000000000000000-mapping.dmp
-
memory/3180-218-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/3204-169-0x0000000000000000-mapping.dmp
-
memory/3204-170-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/3304-175-0x0000000000000000-mapping.dmp
-
memory/3304-176-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/3380-257-0x0000000000000000-mapping.dmp
-
memory/3380-258-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/3404-250-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/3404-249-0x0000000000000000-mapping.dmp
-
memory/3436-201-0x0000000000000000-mapping.dmp
-
memory/3436-202-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/3460-234-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/3460-233-0x0000000000000000-mapping.dmp
-
memory/3492-207-0x0000000000000000-mapping.dmp
-
memory/3492-208-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/3604-192-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/3604-191-0x0000000000000000-mapping.dmp
-
memory/3628-184-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/3628-183-0x0000000000000000-mapping.dmp
-
memory/3656-242-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/3656-241-0x0000000000000000-mapping.dmp
-
memory/3816-243-0x0000000000000000-mapping.dmp
-
memory/3816-244-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/4064-174-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/4064-173-0x0000000000000000-mapping.dmp
-
memory/4152-165-0x0000000000000000-mapping.dmp
-
memory/4152-166-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/4212-200-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/4212-199-0x0000000000000000-mapping.dmp
-
memory/4236-196-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/4236-195-0x0000000000000000-mapping.dmp
-
memory/4248-181-0x0000000000000000-mapping.dmp
-
memory/4248-182-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/4280-261-0x0000000000000000-mapping.dmp
-
memory/4280-262-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/4292-227-0x0000000000000000-mapping.dmp
-
memory/4292-228-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/4320-185-0x0000000000000000-mapping.dmp
-
memory/4320-186-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/4336-189-0x0000000000000000-mapping.dmp
-
memory/4336-190-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/4344-253-0x0000000000000000-mapping.dmp
-
memory/4344-254-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/4628-235-0x0000000000000000-mapping.dmp
-
memory/4628-236-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/4648-230-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/4648-229-0x0000000000000000-mapping.dmp
-
memory/4688-149-0x0000000000000000-mapping.dmp
-
memory/4688-150-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/4828-145-0x0000000000000000-mapping.dmp
-
memory/4828-146-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/4868-205-0x0000000000000000-mapping.dmp
-
memory/4868-206-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/4884-223-0x0000000000000000-mapping.dmp
-
memory/4884-224-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/4912-168-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/4912-167-0x0000000000000000-mapping.dmp
-
memory/4916-226-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/4916-225-0x0000000000000000-mapping.dmp
-
memory/4968-213-0x0000000000000000-mapping.dmp
-
memory/4968-214-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/4984-203-0x0000000000000000-mapping.dmp
-
memory/4984-204-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/5020-180-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/5020-179-0x0000000000000000-mapping.dmp
-
memory/5040-231-0x0000000000000000-mapping.dmp
-
memory/5040-232-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/5060-251-0x0000000000000000-mapping.dmp
-
memory/5060-252-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/5092-212-0x00007FFF2AE20000-0x00007FFF2B856000-memory.dmpFilesize
10.2MB
-
memory/5092-211-0x0000000000000000-mapping.dmp