Analysis
-
max time kernel
115s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2023 02:12
Behavioral task
behavioral1
Sample
P3MKL.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
P3MKL.exe
Resource
win10v2004-20221111-en
General
-
Target
P3MKL.exe
-
Size
1.7MB
-
MD5
f812dea5ffd8ac4eb11cf366b7baccca
-
SHA1
f16dd261312b338f6a23b5a8a29ca649d9e36c4e
-
SHA256
b1304c0e84874b14b78436e3ca39321a10f1b6c67743a74eacd59e435be09292
-
SHA512
c22750b31fae4389e69d715d5ffbbb7e79c7d8294cc3ac9f40a6bdb1921517cb52eed4e8bad5535bf20d3527ba468a845e50f081ba9360f753969025c80d8237
-
SSDEEP
24576:t3QwuLyEbVoCtPreIjNLoN/VNGeSQDx1m17zezKOkCzeJGFUJ:tgwuuEpdDLNwVMeXDL0fdSzAG
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 45 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3116 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4276 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 800 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 836 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2856 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1432 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 372 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4204 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2292 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1428 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2896 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3372 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2468 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 812 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1828 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2084 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4828 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4468 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2644 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2172 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2604 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1328 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2480 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2964 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4536 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2420 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 800 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4408 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1344 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2160 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 944 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3996 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4496 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3692 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3920 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1368 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2264 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4312 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1824 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 984 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4332 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4988 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1616 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5040 2588 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4356 2588 schtasks.exe -
Processes:
resource yara_rule behavioral2/memory/4700-132-0x00000000007D0000-0x0000000000986000-memory.dmp dcrat C:\Users\Admin\AppData\Local\Temp\P3MKL.exe dcrat C:\Program Files\Windows NT\Accessories\en-US\System.exe dcrat C:\Program Files\Windows NT\Accessories\en-US\System.exe dcrat C:\Program Files\Windows NT\Accessories\en-US\System.exe dcrat -
Drops file in Drivers directory 1 IoCs
Processes:
P3MKL.exedescription ioc process File opened for modification C:\Windows\System32\drivers\etc\hosts P3MKL.exe -
Executes dropped EXE 3 IoCs
Processes:
P3MKL.exeSystem.exeSystem.exepid process 1404 P3MKL.exe 1344 System.exe 1000 System.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
P3MKL.exeP3MKL.exeSystem.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation P3MKL.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation P3MKL.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation System.exe -
Drops file in Program Files directory 26 IoCs
Processes:
P3MKL.exeP3MKL.exedescription ioc process File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\RCX8B24.tmp P3MKL.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\Registry.exe P3MKL.exe File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\RCX9123.tmp P3MKL.exe File opened for modification C:\Program Files\Google\Chrome\RCX9432.tmp P3MKL.exe File created C:\Program Files (x86)\MSBuild\Microsoft\SearchApp.exe P3MKL.exe File created C:\Program Files (x86)\Windows Multimedia Platform\886983d96e3d3e P3MKL.exe File created C:\Program Files\Google\Chrome\5940a34987c991 P3MKL.exe File opened for modification C:\Program Files (x86)\Google\RCX842C.tmp P3MKL.exe File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\RCX91B1.tmp P3MKL.exe File created C:\Program Files\Windows NT\Accessories\en-US\27d1bcfc3c54e0 P3MKL.exe File created C:\Program Files (x86)\Google\6203df4a6bafc7 P3MKL.exe File opened for modification C:\Program Files (x86)\Google\RCX83AE.tmp P3MKL.exe File opened for modification C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\RCX8BA2.tmp P3MKL.exe File opened for modification C:\Program Files\Google\Chrome\RCX94C0.tmp P3MKL.exe File opened for modification C:\Program Files\Google\Chrome\dllhost.exe P3MKL.exe File created C:\Program Files (x86)\MSBuild\Microsoft\38384e6a620884 P3MKL.exe File created C:\Program Files\Windows NT\Accessories\en-US\System.exe P3MKL.exe File created C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe P3MKL.exe File opened for modification C:\Program Files (x86)\Google\lsass.exe P3MKL.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\Registry.exe P3MKL.exe File created C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\ee2ad38f3d4382 P3MKL.exe File created C:\Program Files\Google\Chrome\dllhost.exe P3MKL.exe File opened for modification C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe P3MKL.exe File opened for modification C:\Program Files (x86)\MSBuild\Microsoft\SearchApp.exe P3MKL.exe File opened for modification C:\Program Files\Windows NT\Accessories\en-US\System.exe P3MKL.exe File created C:\Program Files (x86)\Google\lsass.exe P3MKL.exe -
Drops file in Windows directory 10 IoCs
Processes:
P3MKL.exeP3MKL.exedescription ioc process File created C:\Windows\ja-JP\OfficeClickToRun.exe P3MKL.exe File created C:\Windows\ja-JP\e6c9b481da804f P3MKL.exe File opened for modification C:\Windows\ja-JP\OfficeClickToRun.exe P3MKL.exe File created C:\Windows\ServiceProfiles\LocalService\Favorites\wininit.exe P3MKL.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\Favorites\RCX874A.tmp P3MKL.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\Favorites\RCX88A2.tmp P3MKL.exe File opened for modification C:\Windows\ServiceProfiles\LocalService\Favorites\wininit.exe P3MKL.exe File created C:\Windows\SystemResources\Windows.UI.Logon\fontdrvhost.exe P3MKL.exe File created C:\Windows\ServiceProfiles\LocalService\Favorites\56085415360792 P3MKL.exe File created C:\Windows\WinSxS\msil_microsoft.web.management.ftp.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3e3835d16b3a75c\smss.exe P3MKL.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 45 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4276 schtasks.exe 2468 schtasks.exe 4828 schtasks.exe 4408 schtasks.exe 1616 schtasks.exe 5040 schtasks.exe 3116 schtasks.exe 4204 schtasks.exe 1428 schtasks.exe 2172 schtasks.exe 4332 schtasks.exe 4988 schtasks.exe 372 schtasks.exe 1828 schtasks.exe 2644 schtasks.exe 3996 schtasks.exe 4312 schtasks.exe 836 schtasks.exe 2480 schtasks.exe 4536 schtasks.exe 800 schtasks.exe 3692 schtasks.exe 1368 schtasks.exe 1824 schtasks.exe 984 schtasks.exe 800 schtasks.exe 2856 schtasks.exe 1432 schtasks.exe 2896 schtasks.exe 812 schtasks.exe 2084 schtasks.exe 1344 schtasks.exe 2264 schtasks.exe 2964 schtasks.exe 944 schtasks.exe 3920 schtasks.exe 2292 schtasks.exe 3372 schtasks.exe 4468 schtasks.exe 2604 schtasks.exe 1328 schtasks.exe 2420 schtasks.exe 2160 schtasks.exe 4496 schtasks.exe 4356 schtasks.exe -
Modifies registry class 3 IoCs
Processes:
P3MKL.exeP3MKL.exeSystem.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings P3MKL.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings P3MKL.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings System.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
P3MKL.exepowershell.exepid process 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe 4620 powershell.exe 4620 powershell.exe 4700 P3MKL.exe 4700 P3MKL.exe 4700 P3MKL.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
Processes:
P3MKL.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeP3MKL.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeSystem.exeSystem.exedescription pid process Token: SeDebugPrivilege 4700 P3MKL.exe Token: SeDebugPrivilege 4620 powershell.exe Token: SeDebugPrivilege 4596 powershell.exe Token: SeDebugPrivilege 4536 powershell.exe Token: SeDebugPrivilege 4056 powershell.exe Token: SeDebugPrivilege 3492 powershell.exe Token: SeDebugPrivilege 3648 powershell.exe Token: SeDebugPrivilege 2732 powershell.exe Token: SeDebugPrivilege 5116 powershell.exe Token: SeDebugPrivilege 2872 powershell.exe Token: SeDebugPrivilege 3856 powershell.exe Token: SeDebugPrivilege 1924 powershell.exe Token: SeDebugPrivilege 1704 powershell.exe Token: SeDebugPrivilege 1404 P3MKL.exe Token: SeDebugPrivilege 4228 powershell.exe Token: SeDebugPrivilege 2864 powershell.exe Token: SeDebugPrivilege 4804 powershell.exe Token: SeDebugPrivilege 2092 powershell.exe Token: SeDebugPrivilege 4208 powershell.exe Token: SeDebugPrivilege 1780 powershell.exe Token: SeDebugPrivilege 5116 powershell.exe Token: SeDebugPrivilege 2132 powershell.exe Token: SeDebugPrivilege 4124 powershell.exe Token: SeDebugPrivilege 1376 powershell.exe Token: SeDebugPrivilege 4932 powershell.exe Token: SeDebugPrivilege 4732 powershell.exe Token: SeDebugPrivilege 1344 System.exe Token: SeDebugPrivilege 1000 System.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
P3MKL.execmd.exeP3MKL.execmd.exeSystem.exedescription pid process target process PID 4700 wrote to memory of 4620 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 4620 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 4596 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 4596 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 4536 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 4536 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 4056 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 4056 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 3492 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 3492 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 2732 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 2732 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 3648 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 3648 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 5116 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 5116 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 2872 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 2872 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 3856 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 3856 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 1704 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 1704 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 1924 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 1924 4700 P3MKL.exe powershell.exe PID 4700 wrote to memory of 4576 4700 P3MKL.exe cmd.exe PID 4700 wrote to memory of 4576 4700 P3MKL.exe cmd.exe PID 4576 wrote to memory of 5104 4576 cmd.exe w32tm.exe PID 4576 wrote to memory of 5104 4576 cmd.exe w32tm.exe PID 4576 wrote to memory of 1404 4576 cmd.exe P3MKL.exe PID 4576 wrote to memory of 1404 4576 cmd.exe P3MKL.exe PID 1404 wrote to memory of 4228 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 4228 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 2864 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 2864 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 4804 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 4804 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 2092 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 2092 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 1780 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 1780 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 2132 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 2132 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 5116 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 5116 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 4208 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 4208 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 4124 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 4124 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 4932 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 4932 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 4732 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 4732 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 1376 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 1376 1404 P3MKL.exe powershell.exe PID 1404 wrote to memory of 1820 1404 P3MKL.exe cmd.exe PID 1404 wrote to memory of 1820 1404 P3MKL.exe cmd.exe PID 1820 wrote to memory of 1252 1820 cmd.exe w32tm.exe PID 1820 wrote to memory of 1252 1820 cmd.exe w32tm.exe PID 1820 wrote to memory of 1344 1820 cmd.exe System.exe PID 1820 wrote to memory of 1344 1820 cmd.exe System.exe PID 1344 wrote to memory of 4596 1344 System.exe WScript.exe PID 1344 wrote to memory of 4596 1344 System.exe WScript.exe PID 1344 wrote to memory of 4696 1344 System.exe WScript.exe PID 1344 wrote to memory of 4696 1344 System.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\P3MKL.exe"C:\Users\Admin\AppData\Local\Temp\P3MKL.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/odt/'2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\CHhgdBbwK0.bat"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:23⤵
-
C:\Users\Admin\AppData\Local\Temp\P3MKL.exe"C:\Users\Admin\AppData\Local\Temp\P3MKL.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/odt/'4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'4⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\sOdT1nlBuB.bat"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:25⤵
-
C:\Program Files\Windows NT\Accessories\en-US\System.exe"C:\Program Files\Windows NT\Accessories\en-US\System.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\1c3b95a0-8b05-4b7e-ad00-e2a3128081fe.vbs"6⤵
-
C:\Program Files\Windows NT\Accessories\en-US\System.exe"C:\Program Files\Windows NT\Accessories\en-US\System.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\df14140f-e4bd-4a88-b006-9e22d1c323b4.vbs"6⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Google\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Google\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\Windows\ServiceProfiles\LocalService\Favorites\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\ServiceProfiles\LocalService\Favorites\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\Windows\ServiceProfiles\LocalService\Favorites\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 9 /tr "'C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\Registry.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 14 /tr "'C:\Program Files\Mozilla Firefox\gmp-clearkey\0.1\Registry.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\USOShared\Logs\User\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Users\All Users\USOShared\Logs\User\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\USOShared\Logs\User\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Multimedia Platform\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\Program Files\Google\Chrome\dllhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Program Files\Google\Chrome\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 8 /tr "'C:\Program Files\Google\Chrome\dllhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Program Files (x86)\MSBuild\Microsoft\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 7 /tr "'C:\Program Files (x86)\MSBuild\Microsoft\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Users\Public\Music\Idle.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Public\Music\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "IdleI" /sc MINUTE /mo 8 /tr "'C:\Users\Public\Music\Idle.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 12 /tr "'C:\Windows\ja-JP\OfficeClickToRun.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Windows\ja-JP\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 9 /tr "'C:\Windows\ja-JP\OfficeClickToRun.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Program Files\Windows NT\Accessories\en-US\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Windows NT\Accessories\en-US\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 8 /tr "'C:\Program Files\Windows NT\Accessories\en-US\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 14 /tr "'C:\odt\SearchApp.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\odt\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 6 /tr "'C:\odt\SearchApp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 12 /tr "'C:\Users\Default\PrintHood\sihost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Users\Default\PrintHood\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sihosts" /sc MINUTE /mo 5 /tr "'C:\Users\Default\PrintHood\sihost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 14 /tr "'C:\odt\csrss.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\odt\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\odt\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TrustedInstallerT" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\TrustedInstaller.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TrustedInstaller" /sc ONLOGON /tr "'C:\Users\Default User\TrustedInstaller.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "TrustedInstallerT" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\TrustedInstaller.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Windows NT\Accessories\en-US\System.exeFilesize
1.7MB
MD5f812dea5ffd8ac4eb11cf366b7baccca
SHA1f16dd261312b338f6a23b5a8a29ca649d9e36c4e
SHA256b1304c0e84874b14b78436e3ca39321a10f1b6c67743a74eacd59e435be09292
SHA512c22750b31fae4389e69d715d5ffbbb7e79c7d8294cc3ac9f40a6bdb1921517cb52eed4e8bad5535bf20d3527ba468a845e50f081ba9360f753969025c80d8237
-
C:\Program Files\Windows NT\Accessories\en-US\System.exeFilesize
1.7MB
MD5f812dea5ffd8ac4eb11cf366b7baccca
SHA1f16dd261312b338f6a23b5a8a29ca649d9e36c4e
SHA256b1304c0e84874b14b78436e3ca39321a10f1b6c67743a74eacd59e435be09292
SHA512c22750b31fae4389e69d715d5ffbbb7e79c7d8294cc3ac9f40a6bdb1921517cb52eed4e8bad5535bf20d3527ba468a845e50f081ba9360f753969025c80d8237
-
C:\Program Files\Windows NT\Accessories\en-US\System.exeFilesize
1.7MB
MD5f812dea5ffd8ac4eb11cf366b7baccca
SHA1f16dd261312b338f6a23b5a8a29ca649d9e36c4e
SHA256b1304c0e84874b14b78436e3ca39321a10f1b6c67743a74eacd59e435be09292
SHA512c22750b31fae4389e69d715d5ffbbb7e79c7d8294cc3ac9f40a6bdb1921517cb52eed4e8bad5535bf20d3527ba468a845e50f081ba9360f753969025c80d8237
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\P3MKL.exe.logFilesize
1KB
MD57800fca2323a4130444c572374a030f4
SHA140c9b8e0e5e7d72a5293f4010f2ccf21e637b4aa
SHA25629f5645ac14353ac460858f52c856548f3aeb144b09eef672a6b4849bafe742e
SHA512c8a7ad930b8c07007c7a67d8c32a2a4a401dcc34ab966e0e80901655fcbe1f5c95b72a195e6381b1de56c2c987eeab093d8e89891bec9e9684785c5d824b3554
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\System.exe.logFilesize
1KB
MD53ad9a5252966a3ab5b1b3222424717be
SHA15397522c86c74ddbfb2585b9613c794f4b4c3410
SHA25627525f5fc7871c6828ab5173315e95b5c7e918d2ee532781c562c378584b5249
SHA512b1a745f7a0f33b777ffc34f74f42752144d9f2d06b8bc613e703570494762b3af87e153212c3274b18af14f17b8619e2f350b7c3cc11228f7d4208d4251e90e6
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD53a6bad9528f8e23fb5c77fbd81fa28e8
SHA1f127317c3bc6407f536c0f0600dcbcf1aabfba36
SHA256986366767de5873f1b170a63f2a33ce05132d1afd90c8f5017afbca8ef1beb05
SHA512846002154a0ece6f3e9feda6f115d3161dc21b3789525dd62ae1d9188495171293efdbe7be4710666dd8a15e66b557315b5a02918a741ed1d5f3ff0c515b98e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5a8e8360d573a4ff072dcc6f09d992c88
SHA13446774433ceaf0b400073914facab11b98b6807
SHA256bf5e284e8f95122bf75ead61c7e2b40f55c96742b05330b5b1cb7915991df13b
SHA5124ee5167643d82082f57c42616007ef9be57f43f9731921bdf7bca611a914724ad94072d3c8f5b130fa54129e5328ccdebf37ba74339c37deb53e79df5cdf0dbe
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5a8e8360d573a4ff072dcc6f09d992c88
SHA13446774433ceaf0b400073914facab11b98b6807
SHA256bf5e284e8f95122bf75ead61c7e2b40f55c96742b05330b5b1cb7915991df13b
SHA5124ee5167643d82082f57c42616007ef9be57f43f9731921bdf7bca611a914724ad94072d3c8f5b130fa54129e5328ccdebf37ba74339c37deb53e79df5cdf0dbe
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cadef9abd087803c630df65264a6c81c
SHA1babbf3636c347c8727c35f3eef2ee643dbcc4bd2
SHA256cce65b73cdfe9304bcd5207913e8b60fb69faa20cd3b684f2b0343b755b99438
SHA5127278aa87124abb382d9024a645e881e7b7cf1b84e8894943b36e018dbf0399e6858392f77980b599fa5488e2e21bf757a0702fe6419417edac93b68e0c2ec085
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD55f0ddc7f3691c81ee14d17b419ba220d
SHA1f0ef5fde8bab9d17c0b47137e014c91be888ee53
SHA256a31805264b8b13ce4145f272cb2830728c186c46e314b48514d636866217add5
SHA5122ce7c2a0833f581297c13dd88ccfcd36bf129d2b5d7718c52b1d67c97cbd8fc93abc085a040229a0fd712e880c690de7f6b996b0b47c46a091fabb7931be58d3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5e3b6cc0fbea08a0831f0026a696db8b8
SHA14e32202d4700061cfd80d55e42798131c9f530d4
SHA2563284cae7b82be99d93064390ba071ba4321f3f24dd21515b37b2ca9f31b2e8d5
SHA5126a06856f360b48c8bc8a15ffb8d7a6604ec357bcb1d0fad5d71a2cb876929a7b67eb40ba4493998ab1bbae8cb71212e124276f27d5c138a135041c27a41a0b7a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5e3b6cc0fbea08a0831f0026a696db8b8
SHA14e32202d4700061cfd80d55e42798131c9f530d4
SHA2563284cae7b82be99d93064390ba071ba4321f3f24dd21515b37b2ca9f31b2e8d5
SHA5126a06856f360b48c8bc8a15ffb8d7a6604ec357bcb1d0fad5d71a2cb876929a7b67eb40ba4493998ab1bbae8cb71212e124276f27d5c138a135041c27a41a0b7a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD57222264b1e63b6fcc9c66d78879da1f0
SHA143537ec2758ae7a438430a30690cb7ff5f3cb138
SHA25642622b208d82db86460a66502f6005b91ffd9917d9c2d7ccffca0a83a583d838
SHA51204c8ec00d4828deabe786b99e16230a48230abb1fcb8bce77a8558d152887aa8f73ce1b16325261d230588470d52d3df74b488303659c335424c3e36f8e4164a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5dd0716df5ff6e2ed8bfa08e271d64dd8
SHA1c342bbe936058ea27843d5dbe5eb434f926612f7
SHA25615ea3598b422f0d7705405688a174b98789b623154d4ccf3f3148f7c10bafdd8
SHA5127e6dc8f9ad269ca3969e7b1284399f16f59559d5a4232537147fb7edcba86932474eff26921c09472894d55ee045dd3e371dcfce65d358785166742582e0b8a4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cfecb4e0f846589c2742fd84d6bbd1db
SHA1730c66c99e80f1c7d0fdd1ef7483c9dfb0a770ec
SHA25612190c96e9eef24f7ee9a4e19d806f29d4aedab1f2c696478dea5684941824aa
SHA512669241f726837dcd3b6c6664e002c4938cf1ccf9be3f3b4a953efb35a2977c6ea9536e1b61b92b1b716991f9801f4516d8e1d53c65ac605174ece553f19da475
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cfecb4e0f846589c2742fd84d6bbd1db
SHA1730c66c99e80f1c7d0fdd1ef7483c9dfb0a770ec
SHA25612190c96e9eef24f7ee9a4e19d806f29d4aedab1f2c696478dea5684941824aa
SHA512669241f726837dcd3b6c6664e002c4938cf1ccf9be3f3b4a953efb35a2977c6ea9536e1b61b92b1b716991f9801f4516d8e1d53c65ac605174ece553f19da475
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5cfecb4e0f846589c2742fd84d6bbd1db
SHA1730c66c99e80f1c7d0fdd1ef7483c9dfb0a770ec
SHA25612190c96e9eef24f7ee9a4e19d806f29d4aedab1f2c696478dea5684941824aa
SHA512669241f726837dcd3b6c6664e002c4938cf1ccf9be3f3b4a953efb35a2977c6ea9536e1b61b92b1b716991f9801f4516d8e1d53c65ac605174ece553f19da475
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD54c513fe7261cbb0fd7ec5d03873693d6
SHA1360d69bf9f5ba328d5f039f4802b2546ac346c4b
SHA2564dc40c8efd2b217c5552937c9fd2b7ac00bc30ac50a81526ab6655278c5a4dc9
SHA5128c0fbffdfc5003e06c7ae0b53052b3478fbd7e2e1b9028db12248383535d04dcfeb80069295e48c5e0ec60504f45610b7bd944b8852cada005a590660caa04d5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD54c60463b0551abf52d31bc311e50c789
SHA159c839439e2b520bf1dc6c9872c03fef8eb85aa0
SHA25631a2eaf3b166c43b57b902ed91ef7ac522724a679b82a31f8bdb5a6a35f76a4f
SHA512b6b7b22f70f930f8ccf619b06f2e31903034774beee22fac8fb507e44352f74fba7ee03380a94ff988d7697ce467216e5ab7f9791c85628fe4afaa4871770676
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD54c60463b0551abf52d31bc311e50c789
SHA159c839439e2b520bf1dc6c9872c03fef8eb85aa0
SHA25631a2eaf3b166c43b57b902ed91ef7ac522724a679b82a31f8bdb5a6a35f76a4f
SHA512b6b7b22f70f930f8ccf619b06f2e31903034774beee22fac8fb507e44352f74fba7ee03380a94ff988d7697ce467216e5ab7f9791c85628fe4afaa4871770676
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD54c60463b0551abf52d31bc311e50c789
SHA159c839439e2b520bf1dc6c9872c03fef8eb85aa0
SHA25631a2eaf3b166c43b57b902ed91ef7ac522724a679b82a31f8bdb5a6a35f76a4f
SHA512b6b7b22f70f930f8ccf619b06f2e31903034774beee22fac8fb507e44352f74fba7ee03380a94ff988d7697ce467216e5ab7f9791c85628fe4afaa4871770676
-
C:\Users\Admin\AppData\Local\Temp\1c3b95a0-8b05-4b7e-ad00-e2a3128081fe.vbsFilesize
732B
MD5df7ea7f27180201deb4e66e429fd2040
SHA147ad4769c8c5809d0ab920e45490f405b19e8e91
SHA25678284461518f09723251a49f8c2d87fd6257e1fa9e87b03ad9296dca94133a13
SHA5128ee0ddcda61a3d5048aed9d7f2f51ca7a00b4229bf4d3c5f6a6635d9992a61401ad87e004e6a12cf072d41301389a5ac9027495e3319d6fa1cbf2d0b85cbb3fb
-
C:\Users\Admin\AppData\Local\Temp\CHhgdBbwK0.batFilesize
208B
MD5f6183855ec7e5ea685a5d49eb68caa23
SHA1e1e29f32a857d32cb07817ac3b3d290e3075d5a8
SHA25696b1956910e43037c3decb5f9bcf587ecb8983fc6a7654548ae9f430219af6d4
SHA512a82c6af0993e7327962a07a78a9ce188699b4de885d49459f16368cdf13af11c588a7388db61381bb297aaeef9a08561570c65cc2c977eb8fde35eb52719de7e
-
C:\Users\Admin\AppData\Local\Temp\P3MKL.exeFilesize
1.7MB
MD5f812dea5ffd8ac4eb11cf366b7baccca
SHA1f16dd261312b338f6a23b5a8a29ca649d9e36c4e
SHA256b1304c0e84874b14b78436e3ca39321a10f1b6c67743a74eacd59e435be09292
SHA512c22750b31fae4389e69d715d5ffbbb7e79c7d8294cc3ac9f40a6bdb1921517cb52eed4e8bad5535bf20d3527ba468a845e50f081ba9360f753969025c80d8237
-
C:\Users\Admin\AppData\Local\Temp\df14140f-e4bd-4a88-b006-9e22d1c323b4.vbsFilesize
508B
MD55ca25050f4059cf4592ec92ba2912605
SHA1bf1457ed257584e8812287ff334f05c11dd58ac1
SHA256e44cb189caf070a56dff17f19be04136017b53e0517ca29bbfab62b04ccb3b8f
SHA51248bf1f25ed9daa3f5b99e0c5609de87c80e5647c6e4e2df0751b1f81b417e90316507ca520eaa13d891f5ffbaa9aa719f289bf7140c63fd241c8f3484a93d417
-
C:\Users\Admin\AppData\Local\Temp\sOdT1nlBuB.batFilesize
221B
MD5a1e547bc6fd0771b5967503757071186
SHA1249aec110a89a44aac4427ec08370dbcd5d2ee70
SHA256fb0860e4df577f5c8010692bde6df4b64610ff8c7a500fdf7156d0f3a3d46197
SHA51247f2c0df646ce2f8bcbf51808603117b677a8d3e34497ed6478c763ab2ac1c92a77c70cda2f5b27ba7e4c640e622c9ce9ea79127341a03ef9836deac531b1d4c
-
memory/1000-289-0x0000000000000000-mapping.dmp
-
memory/1252-226-0x0000000000000000-mapping.dmp
-
memory/1344-254-0x0000000000000000-mapping.dmp
-
memory/1376-245-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/1376-211-0x0000000000000000-mapping.dmp
-
memory/1376-225-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/1404-230-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/1404-194-0x0000000000000000-mapping.dmp
-
memory/1404-197-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/1404-198-0x00000000013A9000-0x00000000013AF000-memory.dmpFilesize
24KB
-
memory/1404-199-0x000000001D830000-0x000000001D834000-memory.dmpFilesize
16KB
-
memory/1404-228-0x000000001D834000-0x000000001D837000-memory.dmpFilesize
12KB
-
memory/1404-229-0x000000001D837000-0x000000001D83A000-memory.dmpFilesize
12KB
-
memory/1704-169-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/1704-149-0x0000000000000000-mapping.dmp
-
memory/1704-193-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/1780-204-0x0000000000000000-mapping.dmp
-
memory/1780-250-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/1780-217-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/1820-212-0x0000000000000000-mapping.dmp
-
memory/1924-191-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/1924-150-0x0000000000000000-mapping.dmp
-
memory/1924-168-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/2092-239-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/2092-203-0x0000000000000000-mapping.dmp
-
memory/2092-216-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/2132-205-0x0000000000000000-mapping.dmp
-
memory/2132-231-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/2132-220-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/2732-170-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/2732-165-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/2732-144-0x0000000000000000-mapping.dmp
-
memory/2864-214-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/2864-201-0x0000000000000000-mapping.dmp
-
memory/2864-235-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/2872-147-0x0000000000000000-mapping.dmp
-
memory/2872-166-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/2872-187-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/3492-143-0x0000000000000000-mapping.dmp
-
memory/3492-162-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/3492-181-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/3648-177-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/3648-145-0x0000000000000000-mapping.dmp
-
memory/3648-163-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/3856-192-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/3856-167-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/3856-148-0x0000000000000000-mapping.dmp
-
memory/4056-161-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/4056-142-0x0000000000000000-mapping.dmp
-
memory/4056-183-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/4124-222-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/4124-208-0x0000000000000000-mapping.dmp
-
memory/4124-247-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/4208-249-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/4208-221-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/4208-207-0x0000000000000000-mapping.dmp
-
memory/4228-234-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/4228-213-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/4228-200-0x0000000000000000-mapping.dmp
-
memory/4536-141-0x0000000000000000-mapping.dmp
-
memory/4536-158-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/4536-175-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/4576-152-0x0000000000000000-mapping.dmp
-
memory/4596-140-0x0000000000000000-mapping.dmp
-
memory/4596-184-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/4596-258-0x0000000000000000-mapping.dmp
-
memory/4596-157-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/4620-173-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/4620-151-0x000001A13DEE0000-0x000001A13DF02000-memory.dmpFilesize
136KB
-
memory/4620-139-0x0000000000000000-mapping.dmp
-
memory/4620-156-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/4696-260-0x0000000000000000-mapping.dmp
-
memory/4700-153-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/4700-137-0x000000001D5B0000-0x000000001D5B4000-memory.dmpFilesize
16KB
-
memory/4700-133-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/4700-134-0x000000001CC60000-0x000000001CCB0000-memory.dmpFilesize
320KB
-
memory/4700-135-0x0000000002959000-0x000000000295F000-memory.dmpFilesize
24KB
-
memory/4700-136-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/4700-138-0x0000000002959000-0x000000000295F000-memory.dmpFilesize
24KB
-
memory/4700-132-0x00000000007D0000-0x0000000000986000-memory.dmpFilesize
1.7MB
-
memory/4700-155-0x0000000002959000-0x000000000295F000-memory.dmpFilesize
24KB
-
memory/4700-154-0x000000001D5B0000-0x000000001D5B4000-memory.dmpFilesize
16KB
-
memory/4732-246-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/4732-227-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/4732-210-0x0000000000000000-mapping.dmp
-
memory/4804-215-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/4804-202-0x0000000000000000-mapping.dmp
-
memory/4804-237-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/4932-252-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/4932-224-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/4932-209-0x0000000000000000-mapping.dmp
-
memory/5104-160-0x0000000000000000-mapping.dmp
-
memory/5116-186-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB
-
memory/5116-146-0x0000000000000000-mapping.dmp
-
memory/5116-206-0x0000000000000000-mapping.dmp
-
memory/5116-218-0x00007FFA966B0000-0x00007FFA97171000-memory.dmpFilesize
10.8MB
-
memory/5116-164-0x00007FFA96AE0000-0x00007FFA975A1000-memory.dmpFilesize
10.8MB