Analysis
-
max time kernel
136s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2023 23:02
General
-
Target
3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe
-
Size
3.1MB
-
MD5
027a60b4337dd0847d0414aa8719ffec
-
SHA1
80f78f880e891adfa8f71fb1447ed19734077062
-
SHA256
3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168
-
SHA512
009703b2c57258ccec76aa97807976e3ad693f3ff90b5417ae920e5860354bdaf4b01caaa850f1996391da5b6d75ebc38509a9b124fd9ae0660d7002b54b606d
-
SSDEEP
49152:ZRxujKxS2EuSIYkgSc71bdf5k6N21D5MwICiaiSLE6k1/lRr:ZRM282P2jScBbS2lRr
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 4524 powershell.exe 4524 powershell.exe 4524 powershell.exe 712 powershell.exe 712 powershell.exe 712 powershell.exe 4512 powershell.exe 4512 powershell.exe 4992 powershell.exe 4992 powershell.exe 1784 powershell.exe 1784 powershell.exe 4132 powershell.exe 4132 powershell.exe 4292 powershell.exe 4292 powershell.exe 4928 powershell.exe 4928 powershell.exe 3724 powershell.exe 3724 powershell.exe 1272 powershell.exe 1272 powershell.exe 5024 powershell.exe 5024 powershell.exe 820 powershell.exe 820 powershell.exe 3540 powershell.exe 3540 powershell.exe 3508 powershell.exe 3508 powershell.exe 2836 powershell.exe 2836 powershell.exe 1740 powershell.exe 1740 powershell.exe 1820 powershell.exe 1820 powershell.exe 3884 powershell.exe 3884 powershell.exe 2216 powershell.exe 2216 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exewmic.exedescription pid process Token: SeIncreaseQuotaPrivilege 1964 WMIC.exe Token: SeSecurityPrivilege 1964 WMIC.exe Token: SeTakeOwnershipPrivilege 1964 WMIC.exe Token: SeLoadDriverPrivilege 1964 WMIC.exe Token: SeSystemProfilePrivilege 1964 WMIC.exe Token: SeSystemtimePrivilege 1964 WMIC.exe Token: SeProfSingleProcessPrivilege 1964 WMIC.exe Token: SeIncBasePriorityPrivilege 1964 WMIC.exe Token: SeCreatePagefilePrivilege 1964 WMIC.exe Token: SeBackupPrivilege 1964 WMIC.exe Token: SeRestorePrivilege 1964 WMIC.exe Token: SeShutdownPrivilege 1964 WMIC.exe Token: SeDebugPrivilege 1964 WMIC.exe Token: SeSystemEnvironmentPrivilege 1964 WMIC.exe Token: SeRemoteShutdownPrivilege 1964 WMIC.exe Token: SeUndockPrivilege 1964 WMIC.exe Token: SeManageVolumePrivilege 1964 WMIC.exe Token: 33 1964 WMIC.exe Token: 34 1964 WMIC.exe Token: 35 1964 WMIC.exe Token: 36 1964 WMIC.exe Token: SeIncreaseQuotaPrivilege 1964 WMIC.exe Token: SeSecurityPrivilege 1964 WMIC.exe Token: SeTakeOwnershipPrivilege 1964 WMIC.exe Token: SeLoadDriverPrivilege 1964 WMIC.exe Token: SeSystemProfilePrivilege 1964 WMIC.exe Token: SeSystemtimePrivilege 1964 WMIC.exe Token: SeProfSingleProcessPrivilege 1964 WMIC.exe Token: SeIncBasePriorityPrivilege 1964 WMIC.exe Token: SeCreatePagefilePrivilege 1964 WMIC.exe Token: SeBackupPrivilege 1964 WMIC.exe Token: SeRestorePrivilege 1964 WMIC.exe Token: SeShutdownPrivilege 1964 WMIC.exe Token: SeDebugPrivilege 1964 WMIC.exe Token: SeSystemEnvironmentPrivilege 1964 WMIC.exe Token: SeRemoteShutdownPrivilege 1964 WMIC.exe Token: SeUndockPrivilege 1964 WMIC.exe Token: SeManageVolumePrivilege 1964 WMIC.exe Token: 33 1964 WMIC.exe Token: 34 1964 WMIC.exe Token: 35 1964 WMIC.exe Token: 36 1964 WMIC.exe Token: SeIncreaseQuotaPrivilege 4976 wmic.exe Token: SeSecurityPrivilege 4976 wmic.exe Token: SeTakeOwnershipPrivilege 4976 wmic.exe Token: SeLoadDriverPrivilege 4976 wmic.exe Token: SeSystemProfilePrivilege 4976 wmic.exe Token: SeSystemtimePrivilege 4976 wmic.exe Token: SeProfSingleProcessPrivilege 4976 wmic.exe Token: SeIncBasePriorityPrivilege 4976 wmic.exe Token: SeCreatePagefilePrivilege 4976 wmic.exe Token: SeBackupPrivilege 4976 wmic.exe Token: SeRestorePrivilege 4976 wmic.exe Token: SeShutdownPrivilege 4976 wmic.exe Token: SeDebugPrivilege 4976 wmic.exe Token: SeSystemEnvironmentPrivilege 4976 wmic.exe Token: SeRemoteShutdownPrivilege 4976 wmic.exe Token: SeUndockPrivilege 4976 wmic.exe Token: SeManageVolumePrivilege 4976 wmic.exe Token: 33 4976 wmic.exe Token: 34 4976 wmic.exe Token: 35 4976 wmic.exe Token: 36 4976 wmic.exe Token: SeIncreaseQuotaPrivilege 4976 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.execmd.execmd.execmd.execmd.exedescription pid process target process PID 3708 wrote to memory of 2180 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe cmd.exe PID 3708 wrote to memory of 2180 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe cmd.exe PID 3708 wrote to memory of 2180 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe cmd.exe PID 2180 wrote to memory of 1964 2180 cmd.exe WMIC.exe PID 2180 wrote to memory of 1964 2180 cmd.exe WMIC.exe PID 2180 wrote to memory of 1964 2180 cmd.exe WMIC.exe PID 3708 wrote to memory of 4976 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe wmic.exe PID 3708 wrote to memory of 4976 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe wmic.exe PID 3708 wrote to memory of 4976 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe wmic.exe PID 3708 wrote to memory of 4372 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe cmd.exe PID 3708 wrote to memory of 4372 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe cmd.exe PID 3708 wrote to memory of 4372 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe cmd.exe PID 4372 wrote to memory of 3100 4372 cmd.exe WMIC.exe PID 4372 wrote to memory of 3100 4372 cmd.exe WMIC.exe PID 4372 wrote to memory of 3100 4372 cmd.exe WMIC.exe PID 3708 wrote to memory of 3844 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe cmd.exe PID 3708 wrote to memory of 3844 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe cmd.exe PID 3708 wrote to memory of 3844 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe cmd.exe PID 3844 wrote to memory of 2664 3844 cmd.exe WMIC.exe PID 3844 wrote to memory of 2664 3844 cmd.exe WMIC.exe PID 3844 wrote to memory of 2664 3844 cmd.exe WMIC.exe PID 3708 wrote to memory of 3096 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe cmd.exe PID 3708 wrote to memory of 3096 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe cmd.exe PID 3708 wrote to memory of 3096 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe cmd.exe PID 3096 wrote to memory of 5060 3096 cmd.exe systeminfo.exe PID 3096 wrote to memory of 5060 3096 cmd.exe systeminfo.exe PID 3096 wrote to memory of 5060 3096 cmd.exe systeminfo.exe PID 3708 wrote to memory of 4524 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 4524 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 4524 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 712 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 712 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 712 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 4512 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 4512 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 4512 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 4992 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 4992 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 4992 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 1784 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 1784 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 1784 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 4132 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 4132 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 4132 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 4292 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 4292 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 4292 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 4928 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 4928 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 4928 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 3724 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 3724 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 3724 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 1272 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 1272 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 1272 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 5024 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 5024 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 5024 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 820 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 820 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 820 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe PID 3708 wrote to memory of 3540 3708 3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe"C:\Users\Admin\AppData\Local\Temp\3dbde13894aa65f33217ab351dd3f5c4fb54d570b3371fef1505a7370aab4168.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵
-
C:\Windows\SysWOW64\cmd.execmd "/c " systeminfo2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History\" \"C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\MRAjWwhTHctcuAx\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data\" \"C:\Users\Admin\AppData\Local\Temp\hxKQFDaFpL\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\SjFbcXoEFfRsWxP\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies\" \"C:\Users\Admin\AppData\Local\Temp\LDnJObCsNV\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\lgTeMaPEZQleQYh\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Data\" \"C:\Users\Admin\AppData\Local\Temp\YzRyWJjPjz\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\pfRFEgmotaFetHs\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\bZRjxAwnwe\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\krBEmfdzdcEkXBA\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History\" \"C:\Users\Admin\AppData\Local\Temp\kjQZLCtTMt\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\TCoaNatyyiNKARe\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Login Data\" \"C:\Users\Admin\AppData\Local\Temp\KJyiXJrscc\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\tNswYNsGRussVma\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Web Data\" \"C:\Users\Admin\AppData\Local\Temp\ozFZBsbOJi\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\FQGZsnwTKSmVoiG\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\LOpbUOpEdK\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\updOMeRVjaRzLNT\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Windows\History\" \"C:\Users\Admin\AppData\Local\Temp\XYeUCWKsXb\""2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD5def65711d78669d7f8e69313be4acf2e
SHA16522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA51205b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5530ef3d740c005075aaea9c75b2a8592
SHA1f3c90420d86bfa0e9301e5756ae8ef28aec192a3
SHA25648488146d26afedb3fcc3975760c260115573ea1a00e8ff83dd50a95fe065526
SHA512cc6b6aa9da3f62cdc1666d61bc5377e5b2b5a1ff53f011d4179bbe2761bf9916616104b9491c3a9e843527bc919a4f2bc0216ac80597db6aab452aecbedb1faf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5deb764a5df8502968a9c907f5b846bac
SHA1d8e6e3c24d2d600f8533f09a371b89ade66dc865
SHA256c627f3a241a7f8f4933b58b1370f670e4bc33f35e7763b1e8caaa67a18152d6c
SHA5122064fbcdfbab61a752ccff71bdb95fbe3d5a7facc385c42ba66692f800b0800242a6e3a1ac411518bbb336242c79f28af2319014102b1a47f83a3252e3450a46
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5c907abd72988a00df4d19ddee33f8aac
SHA16bb6782214b87b757c285d2adc5d2fa20008413f
SHA256b3ac55bb9a57a47ffe96d06d5a77793c3a7122ac0acd8389da7a9165c182808c
SHA512de1301fe2bdf5ec167d2eac7b5863b594c77949178d85ee597a2378d83999fec27a3d7481db3bf465b908c9096f6bb4b58bb92a28cd0c1f1a90603340f85f458
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5a291e68f4ab8f0e7ef05f87f03dde6dd
SHA144480a141094dffcd6aac214ce9b6fd85ab1da07
SHA25698eea9b8c8c01e13e3cf6cc2d6be5d4f0e620faca9a6c8ddf6e14fb92a08e4b0
SHA512851b91fb60cea46a13113b5504c5b50e571c9234037ed53352835dc97e63d1fffb1ea682e46b5d496f72a36055791474ec674c2c2283c1faac6b9f5f28e18dae
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5708401234453f64c5efe9dd4829f1f60
SHA17d3179548ab26441610396570a8780628eb001d3
SHA2561031a2830438423948fc68f97958537b45a1e48cf96ae8448d96741bba442322
SHA51276a754e77c19fb3984ed04cc91a572f32c69667869dc5cec03ac9681bca34cb60d629b4a630a313017bb92f0e91906fde118715169063f9e20b2a11135e49317
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD554066de0ac547db0b058f808e6eee958
SHA1d72a2de75e0e9d6f5150497bde913c198c46ac6f
SHA256003c3064837d052b5f35b8fe98a31b472242b2b8176b70c4fe5be47185d1de6c
SHA512b857012b58bdcabfef66902192f2136bf8c9985558c328c489532e64e25ae44b1c5a6841da58fdc531cb64b65aeac3c576020cb7f5b452cc4a48b7e63abf453a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5a5b045537fee89f5e774e337350ac3f2
SHA15cb416ee1c4ee515629a9a07f4cc214ff5bf27e6
SHA2567add2b01257ba65dc2c9387d65c1390d7cdd1de1fa2744d48f03632a74948097
SHA5129fac01508c933d840ec6c5004b9543e52e8568c1ebe0562ff42bef74eda628c7d650999aa5e5e68742c344c860db056d3fd2b32c821a85a4f3e9e78d482960a6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5bd1d5564d6276da16d38b5a91157110e
SHA1bd012c9e633a00e6f81fec67d913b88dd461df6b
SHA256b1edfebe4f17c13dcbf5da258bf69548a2e59400ed67f95a9f712a7a9de1e05e
SHA5124049bc48cbe5e6953dc50b3348edfe443d05b44234ea6474f43213745bb86a4b9858229ec639ae0b175d7bc462c47be66313a8ac3e8452d53bef6e1af1dc89a7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD517c2039f0037bbc49fe3155e258d6394
SHA12b3ef410ef8b81d83928ff0e14f511142d90a076
SHA2569b8c15a6371323ad57ee1730a8f1c5d7c036b93242eda24a6e5066e4ae55f18f
SHA5120cb6f8e9aca2b053363df543a19c6c8d5a382707a147f8e5d3ffe1db95d07badcd7e81c61e5fb6ca58bab3acff6638c8998675dbf683258d80f5ae7cc9036ed7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD56b347c7c01bd8070e57b51a71baeaefe
SHA180f40f74136de35a72e96c9678b429fa569be9fb
SHA2567c3cfccc4c9e707b635366877e94ae448d4d5b8d40729095b4f41c2e61004161
SHA51225af66c966015e79b0a2b7e55d223c3b470f68001c2da6e568020bc84ece0f063b413f84e2cb054388ffeae2c542ddde033beed720dcb9dd67cafec2e257f879
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5b74e2f72025b5e923c30f1146cbd6502
SHA1b241b638b4834ecf7d532847a081c84fb1570786
SHA256cac4b8b041516afc9150c396eff6c10f53d5ee0432bd361198ca500582a1e84d
SHA5121d266277c3126378234303575ce2a0ccabde9d8426b9f47808abd164ea51d3b4255eb0e3627b1a160c16752ebee1a53f8d824d1687365a1b8cb36c0fcdccd8d8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5dbbb8e738934da310c2224abec32a500
SHA1a56b62dd39d19c4cf604e3133bc3fb3fe8f0f483
SHA25654916dc9183d2b84d6029f4e45ccc01868ca8f47c92e25ead659bd4482c291fa
SHA51245bd69cb11c5daaa1a4199605a19c910bee44bdd67c00bf055cca725adb615e4e4602617c9588212a71b02b5355cb5bb29f8a9820bb881782a083bd80bb1e895
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5b195f0877109d20dfefeae2a2da50e5e
SHA10348d4403e73c3bc88f16f43681bf2201c0a98f8
SHA256fd3a89c6f269f0786088622398521e17488878c2afe63198f55e576a2d542a40
SHA512d8008c4791d6d15d15c74ca5add643eb4fab7eaaa3873e048fbe6ce890fb69a42bed221859a7d777aff4c257d8d36d36d9e0e6d2d311ef93ebd3ea4b742bc95f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD50ef1c4b08095bb3c8c31f3cdaab2449f
SHA1318ef337a91731bee6347181e514b97a2c166855
SHA256ec47f896ceb884cc05b7caa21d0f456d19ed35ad4c3d336cfa70c980201c3dc6
SHA512e5758a6ac9e603d2eaae89741dfa88e29a242d87a01f34a941621fb73afc866a9dfb0dd9925e50b1afc7367c8ff0da6bcaba225818e94e95d3466da695f3a28d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD591104001635ac71ecaab3727d5a7aaf7
SHA13427bc3e7b471ffc2a987734209436d31e83bab0
SHA256232caa0bb06e981f52a5d33b771d2ad20b8d17bed18284c9c73ae636ee7a1531
SHA512deb13d8bc69d46ccb3485fae9afbf43433e6dbefbc18dfd19322019752a264ce634de2abeee9bd88690c7988f0cf5102ba14ecf28d1314a061449f3712bc4ec2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD559a2781aa09a1ec7bd299802af1a4a27
SHA150526b4852afacd7c9e3f4433bbab33a907ece3f
SHA256ab584681f2eab13dd9e27520d39adcf16d62bc4a72f7ff2a86ebb9691bdcf5c4
SHA512f6391d5c3da554f4c81cd5ab15ed1e02eaa976768e8ecb5bef3316d4e19e836b3fb768d331267f79f9114690ce25a232476a51d5b71829eb59cfff923892d002
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5ab7fd403d394e581e888e2041173bbbc
SHA1f973bc3a54166fdcf52cf6414d4d9abff48c1b3c
SHA2569cb315d7c9cab77a2ffde854e844e7f3052ecfcd7414577493c008d17715be88
SHA5122ecfa4f32279ccd2c689444636183116990b2867e9024c589ebb21bcd0f4d65ebcbde86ee4a08656577304dd0ae18b75af87326696970d8b4c048b9d991ac5f9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5c60770d7bd6b08f9738de28bff613bd8
SHA13780d2d9d8ddf6adb6345d00ed9b9acf43b428ac
SHA256d6d6645b9c8660fb225c9f09a95488a5a92ce0e6924ff23c0f933d3fbccb2407
SHA512e548aad14744b2b4f6516509fdede61778bec01ada22aae5507fee7e1c3253450a569526e160fef645ad48c4985a2dcf10d5e4e5d1bd30d3768548c6cd6a22fb
-
C:\Users\Admin\AppData\Local\Temp\FQGZsnwTKSmVoiGFilesize
2KB
MD577e31b1123e94ce5720ceb729a425798
SHA12b65c95f27d8dca23864a3ed4f78490039ae27bf
SHA25668cafb091d3642a1ad2440bdb51834086945ded836ea25c8f75de7e5fc568d85
SHA5129c660381b859040e20745a1cf42646af3bd3780e2795a5ff3cedc61db9877b608d1fc431a1bd3ba3f25dd3643898b1c0f2abfc067c6634e4ce65de2d4c0c724a
-
C:\Users\Admin\AppData\Local\Temp\KJyiXJrsccFilesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
C:\Users\Admin\AppData\Local\Temp\LDnJObCsNVFilesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
C:\Users\Admin\AppData\Local\Temp\LOpbUOpEdKFilesize
2KB
MD577e31b1123e94ce5720ceb729a425798
SHA12b65c95f27d8dca23864a3ed4f78490039ae27bf
SHA25668cafb091d3642a1ad2440bdb51834086945ded836ea25c8f75de7e5fc568d85
SHA5129c660381b859040e20745a1cf42646af3bd3780e2795a5ff3cedc61db9877b608d1fc431a1bd3ba3f25dd3643898b1c0f2abfc067c6634e4ce65de2d4c0c724a
-
C:\Users\Admin\AppData\Local\Temp\MRAjWwhTHctcuAxFilesize
71KB
MD5386c014d0948d4fc41afa98cfca9022e
SHA1786cc52d9b962f55f92202c7d50c3707eb62607b
SHA256448b329f3a10bbe3e8f86cd91509c2783b63d28a375231eb23724f5e141420f2
SHA51213d46209c6b052977d6242763b54ac5e35b389e765c82ba773b520ebf5eacabdfdc22b642cb9760e39ad59dd82fa40a31a8d41fd6dd7ea9c9ad08c57b7d8150f
-
C:\Users\Admin\AppData\Local\Temp\SjFbcXoEFfRsWxPFilesize
71KB
MD5386c014d0948d4fc41afa98cfca9022e
SHA1786cc52d9b962f55f92202c7d50c3707eb62607b
SHA256448b329f3a10bbe3e8f86cd91509c2783b63d28a375231eb23724f5e141420f2
SHA51213d46209c6b052977d6242763b54ac5e35b389e765c82ba773b520ebf5eacabdfdc22b642cb9760e39ad59dd82fa40a31a8d41fd6dd7ea9c9ad08c57b7d8150f
-
C:\Users\Admin\AppData\Local\Temp\TCoaNatyyiNKAReFilesize
2KB
MD577e31b1123e94ce5720ceb729a425798
SHA12b65c95f27d8dca23864a3ed4f78490039ae27bf
SHA25668cafb091d3642a1ad2440bdb51834086945ded836ea25c8f75de7e5fc568d85
SHA5129c660381b859040e20745a1cf42646af3bd3780e2795a5ff3cedc61db9877b608d1fc431a1bd3ba3f25dd3643898b1c0f2abfc067c6634e4ce65de2d4c0c724a
-
C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiCFilesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
C:\Users\Admin\AppData\Local\Temp\YzRyWJjPjzFilesize
92KB
MD5367544a2a5551a41c869eb1b0b5871c3
SHA19051340b95090c07deda0a1df3a9c0b9233f5054
SHA256eb0e2b2ee04cab66e2f7930ea82a5f1b42469ac50e063a8492f9c585f90bc542
SHA5126d1275291530cb8b9944db296c4aed376765015ad6bbf51f4475a347776c99dbb2e748d0c331d89c9e6118adf641ed10e390c8ccb8ae4de4811c858d195cc34c
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xgrqqvti.w0v.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\bZRjxAwnweFilesize
71KB
MD5386c014d0948d4fc41afa98cfca9022e
SHA1786cc52d9b962f55f92202c7d50c3707eb62607b
SHA256448b329f3a10bbe3e8f86cd91509c2783b63d28a375231eb23724f5e141420f2
SHA51213d46209c6b052977d6242763b54ac5e35b389e765c82ba773b520ebf5eacabdfdc22b642cb9760e39ad59dd82fa40a31a8d41fd6dd7ea9c9ad08c57b7d8150f
-
C:\Users\Admin\AppData\Local\Temp\bZRjxAwnweFilesize
71KB
MD5386c014d0948d4fc41afa98cfca9022e
SHA1786cc52d9b962f55f92202c7d50c3707eb62607b
SHA256448b329f3a10bbe3e8f86cd91509c2783b63d28a375231eb23724f5e141420f2
SHA51213d46209c6b052977d6242763b54ac5e35b389e765c82ba773b520ebf5eacabdfdc22b642cb9760e39ad59dd82fa40a31a8d41fd6dd7ea9c9ad08c57b7d8150f
-
C:\Users\Admin\AppData\Local\Temp\hxKQFDaFpLFilesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
C:\Users\Admin\AppData\Local\Temp\kjQZLCtTMtFilesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
C:\Users\Admin\AppData\Local\Temp\krBEmfdzdcEkXBAFilesize
71KB
MD5386c014d0948d4fc41afa98cfca9022e
SHA1786cc52d9b962f55f92202c7d50c3707eb62607b
SHA256448b329f3a10bbe3e8f86cd91509c2783b63d28a375231eb23724f5e141420f2
SHA51213d46209c6b052977d6242763b54ac5e35b389e765c82ba773b520ebf5eacabdfdc22b642cb9760e39ad59dd82fa40a31a8d41fd6dd7ea9c9ad08c57b7d8150f
-
C:\Users\Admin\AppData\Local\Temp\lgTeMaPEZQleQYhFilesize
71KB
MD5386c014d0948d4fc41afa98cfca9022e
SHA1786cc52d9b962f55f92202c7d50c3707eb62607b
SHA256448b329f3a10bbe3e8f86cd91509c2783b63d28a375231eb23724f5e141420f2
SHA51213d46209c6b052977d6242763b54ac5e35b389e765c82ba773b520ebf5eacabdfdc22b642cb9760e39ad59dd82fa40a31a8d41fd6dd7ea9c9ad08c57b7d8150f
-
C:\Users\Admin\AppData\Local\Temp\ozFZBsbOJiFilesize
112KB
MD5780853cddeaee8de70f28a4b255a600b
SHA1ad7a5da33f7ad12946153c497e990720b09005ed
SHA2561055ff62de3dea7645c732583242adf4164bdcfb9dd37d9b35bbb9510d59b0a3
SHA512e422863112084bb8d11c682482e780cd63c2f20c8e3a93ed3b9efd1b04d53eb5d3c8081851ca89b74d66f3d9ab48eb5f6c74550484f46e7c6e460a8250c9b1d8
-
C:\Users\Admin\AppData\Local\Temp\pfRFEgmotaFetHsFilesize
71KB
MD5386c014d0948d4fc41afa98cfca9022e
SHA1786cc52d9b962f55f92202c7d50c3707eb62607b
SHA256448b329f3a10bbe3e8f86cd91509c2783b63d28a375231eb23724f5e141420f2
SHA51213d46209c6b052977d6242763b54ac5e35b389e765c82ba773b520ebf5eacabdfdc22b642cb9760e39ad59dd82fa40a31a8d41fd6dd7ea9c9ad08c57b7d8150f
-
C:\Users\Admin\AppData\Local\Temp\tNswYNsGRussVmaFilesize
2KB
MD577e31b1123e94ce5720ceb729a425798
SHA12b65c95f27d8dca23864a3ed4f78490039ae27bf
SHA25668cafb091d3642a1ad2440bdb51834086945ded836ea25c8f75de7e5fc568d85
SHA5129c660381b859040e20745a1cf42646af3bd3780e2795a5ff3cedc61db9877b608d1fc431a1bd3ba3f25dd3643898b1c0f2abfc067c6634e4ce65de2d4c0c724a
-
C:\Users\Admin\AppData\Local\Temp\updOMeRVjaRzLNTFilesize
2KB
MD577e31b1123e94ce5720ceb729a425798
SHA12b65c95f27d8dca23864a3ed4f78490039ae27bf
SHA25668cafb091d3642a1ad2440bdb51834086945ded836ea25c8f75de7e5fc568d85
SHA5129c660381b859040e20745a1cf42646af3bd3780e2795a5ff3cedc61db9877b608d1fc431a1bd3ba3f25dd3643898b1c0f2abfc067c6634e4ce65de2d4c0c724a
-
C:\Users\Admin\AppData\Local\Temp\updOMeRVjaRzLNTFilesize
2KB
MD577e31b1123e94ce5720ceb729a425798
SHA12b65c95f27d8dca23864a3ed4f78490039ae27bf
SHA25668cafb091d3642a1ad2440bdb51834086945ded836ea25c8f75de7e5fc568d85
SHA5129c660381b859040e20745a1cf42646af3bd3780e2795a5ff3cedc61db9877b608d1fc431a1bd3ba3f25dd3643898b1c0f2abfc067c6634e4ce65de2d4c0c724a
-
memory/712-159-0x00000000051B0000-0x00000000051C0000-memory.dmpFilesize
64KB
-
memory/712-160-0x00000000051B0000-0x00000000051C0000-memory.dmpFilesize
64KB
-
memory/820-316-0x00000000049B0000-0x00000000049C0000-memory.dmpFilesize
64KB
-
memory/820-315-0x00000000049B0000-0x00000000049C0000-memory.dmpFilesize
64KB
-
memory/1272-286-0x0000000002710000-0x0000000002720000-memory.dmpFilesize
64KB
-
memory/1272-287-0x0000000002710000-0x0000000002720000-memory.dmpFilesize
64KB
-
memory/1740-376-0x0000000002670000-0x0000000002680000-memory.dmpFilesize
64KB
-
memory/1740-375-0x0000000002670000-0x0000000002680000-memory.dmpFilesize
64KB
-
memory/1820-389-0x00000000021E0000-0x00000000021F0000-memory.dmpFilesize
64KB
-
memory/1820-390-0x00000000021E0000-0x00000000021F0000-memory.dmpFilesize
64KB
-
memory/2216-411-0x0000000005180000-0x0000000005190000-memory.dmpFilesize
64KB
-
memory/2216-410-0x0000000005180000-0x0000000005190000-memory.dmpFilesize
64KB
-
memory/2836-361-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/2836-360-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/3508-345-0x0000000002BA0000-0x0000000002BB0000-memory.dmpFilesize
64KB
-
memory/3508-346-0x0000000002BA0000-0x0000000002BB0000-memory.dmpFilesize
64KB
-
memory/3540-330-0x0000000005160000-0x0000000005170000-memory.dmpFilesize
64KB
-
memory/3540-331-0x0000000005160000-0x0000000005170000-memory.dmpFilesize
64KB
-
memory/3724-261-0x0000000004F90000-0x0000000004FA0000-memory.dmpFilesize
64KB
-
memory/3724-262-0x0000000004F90000-0x0000000004FA0000-memory.dmpFilesize
64KB
-
memory/3884-405-0x00000000049E0000-0x00000000049F0000-memory.dmpFilesize
64KB
-
memory/3884-404-0x00000000049E0000-0x00000000049F0000-memory.dmpFilesize
64KB
-
memory/4132-227-0x0000000002E10000-0x0000000002E20000-memory.dmpFilesize
64KB
-
memory/4132-228-0x0000000002E10000-0x0000000002E20000-memory.dmpFilesize
64KB
-
memory/4292-243-0x0000000004920000-0x0000000004930000-memory.dmpFilesize
64KB
-
memory/4292-242-0x0000000004920000-0x0000000004930000-memory.dmpFilesize
64KB
-
memory/4512-184-0x0000000004BE0000-0x0000000004BF0000-memory.dmpFilesize
64KB
-
memory/4512-185-0x0000000004BE0000-0x0000000004BF0000-memory.dmpFilesize
64KB
-
memory/4524-151-0x0000000006070000-0x000000000608A000-memory.dmpFilesize
104KB
-
memory/4524-136-0x00000000053A0000-0x0000000005406000-memory.dmpFilesize
408KB
-
memory/4524-149-0x0000000005B70000-0x0000000005B8E000-memory.dmpFilesize
120KB
-
memory/4524-147-0x0000000004730000-0x0000000004740000-memory.dmpFilesize
64KB
-
memory/4524-150-0x0000000006AD0000-0x0000000006B66000-memory.dmpFilesize
600KB
-
memory/4524-133-0x0000000002280000-0x00000000022B6000-memory.dmpFilesize
216KB
-
memory/4524-137-0x0000000005480000-0x00000000054E6000-memory.dmpFilesize
408KB
-
memory/4524-148-0x0000000004730000-0x0000000004740000-memory.dmpFilesize
64KB
-
memory/4524-134-0x0000000004D70000-0x0000000005398000-memory.dmpFilesize
6.2MB
-
memory/4524-152-0x00000000060C0000-0x00000000060E2000-memory.dmpFilesize
136KB
-
memory/4524-135-0x0000000004CC0000-0x0000000004CE2000-memory.dmpFilesize
136KB
-
memory/4524-153-0x0000000007120000-0x00000000076C4000-memory.dmpFilesize
5.6MB
-
memory/4928-257-0x0000000002C10000-0x0000000002C20000-memory.dmpFilesize
64KB
-
memory/4992-199-0x0000000002D10000-0x0000000002D20000-memory.dmpFilesize
64KB
-
memory/4992-200-0x0000000002D10000-0x0000000002D20000-memory.dmpFilesize
64KB
-
memory/5024-301-0x00000000045E0000-0x00000000045F0000-memory.dmpFilesize
64KB