Analysis
-
max time kernel
91s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2023 21:16
General
-
Target
c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe
-
Size
3.1MB
-
MD5
2b6319f8e8c87f1780f050151a422a1d
-
SHA1
4045039a1901a461d67614f99ec89e1121dee982
-
SHA256
c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32
-
SHA512
b18f8ac5d2139df50c9e310168269e40d201768147265985a487289c122499780a9d200833de2293c66d1e1eec0eb153ecc5d3d21f420977f79f7d0d827b96bc
-
SSDEEP
49152:GlAh6SL79HCOcWXS+jk1Jdf5k6N21D5MHMMta+SLv6k1sry/:GaQ+7lUqS+jwtSIry/
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Suspicious behavior: EnumeratesProcesses 38 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 3724 powershell.exe 3724 powershell.exe 4952 powershell.exe 4952 powershell.exe 2348 powershell.exe 2348 powershell.exe 3496 powershell.exe 3496 powershell.exe 3784 powershell.exe 3784 powershell.exe 1984 powershell.exe 1984 powershell.exe 1336 powershell.exe 1336 powershell.exe 2124 powershell.exe 2124 powershell.exe 3636 powershell.exe 3636 powershell.exe 836 powershell.exe 836 powershell.exe 2660 powershell.exe 2660 powershell.exe 1372 powershell.exe 1372 powershell.exe 928 powershell.exe 928 powershell.exe 4352 powershell.exe 4352 powershell.exe 3180 powershell.exe 3180 powershell.exe 4592 powershell.exe 4592 powershell.exe 224 powershell.exe 224 powershell.exe 2296 powershell.exe 2296 powershell.exe 4836 powershell.exe 4836 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exewmic.exedescription pid process Token: SeIncreaseQuotaPrivilege 448 WMIC.exe Token: SeSecurityPrivilege 448 WMIC.exe Token: SeTakeOwnershipPrivilege 448 WMIC.exe Token: SeLoadDriverPrivilege 448 WMIC.exe Token: SeSystemProfilePrivilege 448 WMIC.exe Token: SeSystemtimePrivilege 448 WMIC.exe Token: SeProfSingleProcessPrivilege 448 WMIC.exe Token: SeIncBasePriorityPrivilege 448 WMIC.exe Token: SeCreatePagefilePrivilege 448 WMIC.exe Token: SeBackupPrivilege 448 WMIC.exe Token: SeRestorePrivilege 448 WMIC.exe Token: SeShutdownPrivilege 448 WMIC.exe Token: SeDebugPrivilege 448 WMIC.exe Token: SeSystemEnvironmentPrivilege 448 WMIC.exe Token: SeRemoteShutdownPrivilege 448 WMIC.exe Token: SeUndockPrivilege 448 WMIC.exe Token: SeManageVolumePrivilege 448 WMIC.exe Token: 33 448 WMIC.exe Token: 34 448 WMIC.exe Token: 35 448 WMIC.exe Token: 36 448 WMIC.exe Token: SeIncreaseQuotaPrivilege 448 WMIC.exe Token: SeSecurityPrivilege 448 WMIC.exe Token: SeTakeOwnershipPrivilege 448 WMIC.exe Token: SeLoadDriverPrivilege 448 WMIC.exe Token: SeSystemProfilePrivilege 448 WMIC.exe Token: SeSystemtimePrivilege 448 WMIC.exe Token: SeProfSingleProcessPrivilege 448 WMIC.exe Token: SeIncBasePriorityPrivilege 448 WMIC.exe Token: SeCreatePagefilePrivilege 448 WMIC.exe Token: SeBackupPrivilege 448 WMIC.exe Token: SeRestorePrivilege 448 WMIC.exe Token: SeShutdownPrivilege 448 WMIC.exe Token: SeDebugPrivilege 448 WMIC.exe Token: SeSystemEnvironmentPrivilege 448 WMIC.exe Token: SeRemoteShutdownPrivilege 448 WMIC.exe Token: SeUndockPrivilege 448 WMIC.exe Token: SeManageVolumePrivilege 448 WMIC.exe Token: 33 448 WMIC.exe Token: 34 448 WMIC.exe Token: 35 448 WMIC.exe Token: 36 448 WMIC.exe Token: SeIncreaseQuotaPrivilege 336 wmic.exe Token: SeSecurityPrivilege 336 wmic.exe Token: SeTakeOwnershipPrivilege 336 wmic.exe Token: SeLoadDriverPrivilege 336 wmic.exe Token: SeSystemProfilePrivilege 336 wmic.exe Token: SeSystemtimePrivilege 336 wmic.exe Token: SeProfSingleProcessPrivilege 336 wmic.exe Token: SeIncBasePriorityPrivilege 336 wmic.exe Token: SeCreatePagefilePrivilege 336 wmic.exe Token: SeBackupPrivilege 336 wmic.exe Token: SeRestorePrivilege 336 wmic.exe Token: SeShutdownPrivilege 336 wmic.exe Token: SeDebugPrivilege 336 wmic.exe Token: SeSystemEnvironmentPrivilege 336 wmic.exe Token: SeRemoteShutdownPrivilege 336 wmic.exe Token: SeUndockPrivilege 336 wmic.exe Token: SeManageVolumePrivilege 336 wmic.exe Token: 33 336 wmic.exe Token: 34 336 wmic.exe Token: 35 336 wmic.exe Token: 36 336 wmic.exe Token: SeIncreaseQuotaPrivilege 336 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1956 wrote to memory of 3864 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe cmd.exe PID 1956 wrote to memory of 3864 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe cmd.exe PID 1956 wrote to memory of 3864 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe cmd.exe PID 3864 wrote to memory of 448 3864 cmd.exe WMIC.exe PID 3864 wrote to memory of 448 3864 cmd.exe WMIC.exe PID 3864 wrote to memory of 448 3864 cmd.exe WMIC.exe PID 1956 wrote to memory of 336 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe wmic.exe PID 1956 wrote to memory of 336 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe wmic.exe PID 1956 wrote to memory of 336 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe wmic.exe PID 1956 wrote to memory of 1012 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe cmd.exe PID 1956 wrote to memory of 1012 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe cmd.exe PID 1956 wrote to memory of 1012 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe cmd.exe PID 1012 wrote to memory of 3356 1012 cmd.exe WMIC.exe PID 1012 wrote to memory of 3356 1012 cmd.exe WMIC.exe PID 1012 wrote to memory of 3356 1012 cmd.exe WMIC.exe PID 1956 wrote to memory of 4372 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe cmd.exe PID 1956 wrote to memory of 4372 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe cmd.exe PID 1956 wrote to memory of 4372 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe cmd.exe PID 4372 wrote to memory of 3476 4372 cmd.exe WMIC.exe PID 4372 wrote to memory of 3476 4372 cmd.exe WMIC.exe PID 4372 wrote to memory of 3476 4372 cmd.exe WMIC.exe PID 1956 wrote to memory of 1520 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe cmd.exe PID 1956 wrote to memory of 1520 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe cmd.exe PID 1956 wrote to memory of 1520 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe cmd.exe PID 1520 wrote to memory of 1096 1520 cmd.exe systeminfo.exe PID 1520 wrote to memory of 1096 1520 cmd.exe systeminfo.exe PID 1520 wrote to memory of 1096 1520 cmd.exe systeminfo.exe PID 1956 wrote to memory of 3724 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 3724 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 3724 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 4952 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 4952 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 4952 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 2348 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 2348 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 2348 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 3496 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 3496 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 3496 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 3784 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 3784 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 3784 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 1984 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 1984 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 1984 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 1336 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 1336 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 1336 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 2124 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 2124 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 2124 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 3636 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 3636 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 3636 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 836 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 836 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 836 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 2660 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 2660 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 2660 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 1372 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 1372 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 1372 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe PID 1956 wrote to memory of 928 1956 c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe"C:\Users\Admin\AppData\Local\Temp\c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:448 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:336 -
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵PID:3356
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵PID:3476
-
C:\Windows\SysWOW64\cmd.execmd "/c " systeminfo2⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:1096 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History\" \"C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\MRAjWwhTHctcuAx\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data\" \"C:\Users\Admin\AppData\Local\Temp\hxKQFDaFpL\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\SjFbcXoEFfRsWxP\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies\" \"C:\Users\Admin\AppData\Local\Temp\LDnJObCsNV\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3784 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\lgTeMaPEZQleQYh\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1984 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Data\" \"C:\Users\Admin\AppData\Local\Temp\YzRyWJjPjz\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1336 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\pfRFEgmotaFetHs\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2124 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\bZRjxAwnwe\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3636 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\krBEmfdzdcEkXBA\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:836 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History\" \"C:\Users\Admin\AppData\Local\Temp\kjQZLCtTMt\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\TCoaNatyyiNKARe\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1372 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Login Data\" \"C:\Users\Admin\AppData\Local\Temp\KJyiXJrscc\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:928 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\tNswYNsGRussVma\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Web Data\" \"C:\Users\Admin\AppData\Local\Temp\ozFZBsbOJi\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3180 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\FQGZsnwTKSmVoiG\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4592 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\LOpbUOpEdK\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:224 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\updOMeRVjaRzLNT\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Windows\History\" \"C:\Users\Admin\AppData\Local\Temp\XYeUCWKsXb\""2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD5def65711d78669d7f8e69313be4acf2e
SHA16522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA51205b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD58d8a20c2d20a8a354dfc00c5e3e02f7a
SHA193f4c0092b34850c73784d379cd6d895327e5691
SHA256a912838822e1558ac8cda9a1e80d8c52cb24a38b7a3f0e9799df3f35718251c1
SHA512128091c8348ab419284cd3bb6333ba58dcf8ae09760d07854406f463f76a42f903b79c9cdf62eee7e20f2cbe494cfb51a891fed0cf7e6c6f43aaba005cc46c75
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5b6189807074639f19c13160c359c5d0e
SHA1bb9294dc8ca146023fd3ba02c1bdc96235bd9eaf
SHA25667cbf20502a3459f8b65384a3721dd032d83f32f3dbc02a7a454a417a0184bae
SHA512cded58f97fa91c2fbac3de2bae7ef81828707794f17ae9b2a40ced5ed56deda77ea9b227f2137e050815b69e6ff5eebe88cec2e08b389ea58f7b715ce6bb5aab
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5d5d8076efdd8a044f2c55acb51b7f070
SHA194df9ee985793f592464555b5c102b093515487f
SHA256ec853dba4b87f64dfe5904ec2cf76285cae873810f53ab17f20e416eadc448c2
SHA51288ef58efa2fe6240d0aebad412277b83f5620dba6e5d9b18c92bc05db1e73efedbbf08671d3264d262a67e850ea005b9ef4c8eb11b0abe7895f8c53784e3785c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5d234d0d739adacf1cf08c107689ea0fc
SHA106d1e5b52f84e38ce302543011e014c6e6d91666
SHA2566c2a8a6d788e1ee9d10252c58d526ebe887107947cbd40409c9ba2c15dddfa02
SHA512885112117f81b0f3031b0c9b13c26a8093e6484d1bbcd6a359e77ac938f435e086308cb59102c11de0c0d0145f4f4ff91ea173274a8cc176644d39d48e8c531e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5d6489f11d35bd388ea7f2aacd6b3e516
SHA1228ff562e380411590d72f6316a16a8fe2b864a3
SHA2560fcaa7ca42ea58cabb08252b765e53ed8e389d2c65bde8336421c301dedb30bd
SHA51263cde195ad994ca71e66b38edf7eac50f1181bfcdcebd57e9905662712a87a24ecb92418647e65210858bff5c278018b6de4a01bb742474e4393ed7bb7f02eb8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5b9a065d3bca5e32206bba76ddaebb1af
SHA11b8d9676ae4d07b51ab8d50e1dc984707e3d2068
SHA25647f97fdc2c8b52b26672a0ad1788899abf0e3c0c995e8b6545d31f1764c7628d
SHA512c0cbd5b785643e7c756c0a01cdcc02e49541858eae83619498705b612c1e1c7a3826e5152b4360f3a1df65af0b7f28a9f320cb1d9b4454cf2764655477b3c207
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD59e39529e4adc268188dc4cccd8b5cd95
SHA13848e138510166d9f6f9b83afc337ad0ab3cb649
SHA25646bf045fbbbbab55dd8a819d993fb28ed538b91de6cbb090eefc5e5b949fa89d
SHA5129ea6c898b48f4e0b0690b75352cdcf9c728697339b1a04e5b930b6248d3d5254ca9807149460b19a1bb37912054c9ffe1e2d6404ed335219800d5e672279bae9
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD591a991a50fccf15e3a74de33a04ef897
SHA1225ad35fd7305521a16ed14689ae01d8f85b8800
SHA2563e08caa60937c0f8f45cc825628981491b008dfab08c50127973b69402020f59
SHA512c067432596ac95dc3a6314dfb981e076c58997d09f77f0c57d234e6d99c8c6a7a15ce1fd2f76e3b76138e2ea0bf108ec8b1179d8e2782b2aff963dd40baffb29
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5848a064e96a39d159e4377e958922d61
SHA1eda7ed9e30f1fc8b7d446186194929cdb8c7c847
SHA2569f7429d7c3b06e7dc921b0246ff357bde5bb279e86c141147b850df616a98ee8
SHA51249cbcb2a97818620745b7411a78120f132b40ba05ba40e470726613b92f841ef78f88ba716fbf74ba054cba393b0543487f0ef5bc095b05159bda56649a29bd4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5b20765c0e4f5969572f1f21b3867042a
SHA11a62a8d15fafa8701c08c8d238595980a773f00e
SHA2563f672f9d7bf33ebf7f7a8f482ff2f3abba84d3f60e86611006b09a81e73a1bd4
SHA5120719a5422f90044bde55dc89b42cb59f71ac84d5a4e504cc9ebb7b5d1fa2beae4ea76d3083390d052321be6cec5aa121349555fe84a24bad5457f9bd123bbc54
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD59a203853dc849824c1f3d0f9fa2e3db4
SHA1b40c109ec70c2ea2a001abe8510b32e773b0c256
SHA256e4d263f1cc87bdb26cf0bd00bf3773350628b98b1d7acb63c124736728d80ff5
SHA51254a4a0d2ea5957b326f2454edbdafc0b9260e1002e07a12895b3bb3dded51edff9dc929ee4d8e7a88d0d00d44d7c36510114b7153ca7b68f19be620d3987d923
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD581048bea76efafc29fc6d7b545702536
SHA1927b1ae2e935f2de2856f0b512bc3001502c27ea
SHA256953d567d12a15bc0c5b4bcd908340ff4de9552d6b8505000d7ce335969971d45
SHA512270bc5ebd3a7db774d32116bd61648a21a3267debda6052009573034f1f312ba45d6781ddfc4aef3e503b3b391b6b4eaf74c63b35742a3cbb7f9b8317eead2f7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD54cdb635959496f01e9faf25801ad220a
SHA11c3541c36f7190d7c2aa7f322aa845f509690be3
SHA2565f1d3320f6ce7b2d3df5f21ce1d72a85cd00804f4ed64b9f46c39b52fba6fde9
SHA51217039e6dcddfc4f4bd7e6201c882f91b771b7c8a253bdf2327239ba55fe1344ccf0fe14ba927b65f756e6c5710021ff4f631145207abb89c749bb2bc58aa8abc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5029aa558e3ea63f6f7833214a673fd64
SHA1075b2b7d7bbe0be16b1d7dd72cc3118972ab2be6
SHA256d7b55f1cd0667b608d2d8052a5ee99c3285ca8ab2fee177a702a9c216766349e
SHA512b82cdd8ecb771382e8da2ce11bd6752f9f0b5f23cfd83956103de594127c7a7abe8ba0fadf683644e9aaea666e88817da59229df4b76824c4892740d1bdad796
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5eea6314184a88d8b19e39a14e503bbae
SHA167fcaf27e6b28af181cee6cbde9b44ce01a98a7a
SHA256d29f498f36bfcce40a2bc651e674732413bb2ff973e8f63c032c673ed80131f2
SHA5128cb9c8c8be15d1a3335e084d3eb9daaf94dfaecbebd76e123b2c961ce76c5c50050706fb3f901df997863560e2e85832a6ef5ec93f29243c00143ab0a976b045
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD577022304bc8e406c655db18a04510547
SHA15ce6b8e4cabe6719232c3572bfdc03b361d1ce0f
SHA256b772ee5268d46dfedb9456bc39fff8997ea79c32fd36625cbbb4ce8bd2a33314
SHA512db95c7cd4242db9aa96738f0d1288819e04a4f744adabab360f22afac5081ad5cb58e4b16102e1c80838279d2abbd812795ce2d89df9affb9c8dd4a7a4398ac1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5ad21804f516e8e477e8f47eed6b88d84
SHA15203c5d71eed352ca337b4a79d2da4af765f3437
SHA256628881014fbb19516b7ffc6ac741115a165e7cbe4abde0abd363f876ed204ad3
SHA512bf4895521d722524017dc2ddc2723d1c2ebde5cf267451ab839cf8f6f7b387a6cc75944da99a9c69ae8ebc09f1ea8c4b4510e7ac445f60ccf0f80434e59ad777
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5c554b82a4798a7140004d0847a4ff708
SHA1f754f1f05af1ee38eb7317c2ed88acfd5c3a8335
SHA256ee28266ad9c532a94a51b4485b48f5fe0d0794461af139e9de01933aaba4b903
SHA512d902560d7bfd18314a0c14e238824ab73d2794936e2bd8e58ce4da43f4a7af52348f8afe15cd410a4ef21f7c7c649e610caf7f0e5e2813270d3c8271c19a4103
-
C:\Users\Admin\AppData\Local\Temp\FQGZsnwTKSmVoiGFilesize
2KB
MD5dd7a4110e2dc0760efdd47ee918c0deb
SHA15ed5efe128e521023e0caf4fff9af747522c8166
SHA256550ad8794d9ec26bc7e09225cb1cbe648ee7c1c2349aabec8172f08bdec26084
SHA512c928725e5f010d371727aadcc057da91378a0b24c66b2848217e9186dd319b6bf09c0859d7bf523ff1736fc41591eb25662a900fbe3977b63132a0c40dcd35dc
-
C:\Users\Admin\AppData\Local\Temp\KJyiXJrsccFilesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
C:\Users\Admin\AppData\Local\Temp\LDnJObCsNVFilesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
C:\Users\Admin\AppData\Local\Temp\LOpbUOpEdKFilesize
2KB
MD5dd7a4110e2dc0760efdd47ee918c0deb
SHA15ed5efe128e521023e0caf4fff9af747522c8166
SHA256550ad8794d9ec26bc7e09225cb1cbe648ee7c1c2349aabec8172f08bdec26084
SHA512c928725e5f010d371727aadcc057da91378a0b24c66b2848217e9186dd319b6bf09c0859d7bf523ff1736fc41591eb25662a900fbe3977b63132a0c40dcd35dc
-
C:\Users\Admin\AppData\Local\Temp\MRAjWwhTHctcuAxFilesize
71KB
MD5dc2b0f48d8f547d5ff7d67b371d850f0
SHA184d02ddbf478bf7cfe9ccb466362860ee18b3839
SHA2560434c46910f48821a0a442b510260a3faea9404d7e6a8edd2cf44cc7dfea3890
SHA5123470ae3db7053a7e606a221f97f8cadf58500a746daaa4c763d714fe99df026d1c7858aaaf6d34ec1bbaa5305f8eead00101b6a7ac6f4d457425d04bcf92e8d7
-
C:\Users\Admin\AppData\Local\Temp\SjFbcXoEFfRsWxPFilesize
71KB
MD5dc2b0f48d8f547d5ff7d67b371d850f0
SHA184d02ddbf478bf7cfe9ccb466362860ee18b3839
SHA2560434c46910f48821a0a442b510260a3faea9404d7e6a8edd2cf44cc7dfea3890
SHA5123470ae3db7053a7e606a221f97f8cadf58500a746daaa4c763d714fe99df026d1c7858aaaf6d34ec1bbaa5305f8eead00101b6a7ac6f4d457425d04bcf92e8d7
-
C:\Users\Admin\AppData\Local\Temp\TCoaNatyyiNKAReFilesize
2KB
MD5dd7a4110e2dc0760efdd47ee918c0deb
SHA15ed5efe128e521023e0caf4fff9af747522c8166
SHA256550ad8794d9ec26bc7e09225cb1cbe648ee7c1c2349aabec8172f08bdec26084
SHA512c928725e5f010d371727aadcc057da91378a0b24c66b2848217e9186dd319b6bf09c0859d7bf523ff1736fc41591eb25662a900fbe3977b63132a0c40dcd35dc
-
C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiCFilesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
C:\Users\Admin\AppData\Local\Temp\YzRyWJjPjzFilesize
92KB
MD54b609cebb20f08b79628408f4fa2ad42
SHA1f725278c8bc0527c316e01827f195de5c9a8f934
SHA2562802818c570f9da1ce2e2fe2ff12cd3190b4c287866a3e4dfe2ad3a7df4cecdf
SHA51219111811722223521c8ef801290e2d5d8a49c0800363b9cf4232ca037dbcc515aa16ba6c043193f81388260db0e9a7cdb31b0da8c7ffa5bcad67ddbd842e2c60
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4zuw55xp.yqs.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\bZRjxAwnweFilesize
71KB
MD5dc2b0f48d8f547d5ff7d67b371d850f0
SHA184d02ddbf478bf7cfe9ccb466362860ee18b3839
SHA2560434c46910f48821a0a442b510260a3faea9404d7e6a8edd2cf44cc7dfea3890
SHA5123470ae3db7053a7e606a221f97f8cadf58500a746daaa4c763d714fe99df026d1c7858aaaf6d34ec1bbaa5305f8eead00101b6a7ac6f4d457425d04bcf92e8d7
-
C:\Users\Admin\AppData\Local\Temp\bZRjxAwnweFilesize
71KB
MD5dc2b0f48d8f547d5ff7d67b371d850f0
SHA184d02ddbf478bf7cfe9ccb466362860ee18b3839
SHA2560434c46910f48821a0a442b510260a3faea9404d7e6a8edd2cf44cc7dfea3890
SHA5123470ae3db7053a7e606a221f97f8cadf58500a746daaa4c763d714fe99df026d1c7858aaaf6d34ec1bbaa5305f8eead00101b6a7ac6f4d457425d04bcf92e8d7
-
C:\Users\Admin\AppData\Local\Temp\hxKQFDaFpLFilesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
C:\Users\Admin\AppData\Local\Temp\kjQZLCtTMtFilesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
C:\Users\Admin\AppData\Local\Temp\krBEmfdzdcEkXBAFilesize
71KB
MD5dc2b0f48d8f547d5ff7d67b371d850f0
SHA184d02ddbf478bf7cfe9ccb466362860ee18b3839
SHA2560434c46910f48821a0a442b510260a3faea9404d7e6a8edd2cf44cc7dfea3890
SHA5123470ae3db7053a7e606a221f97f8cadf58500a746daaa4c763d714fe99df026d1c7858aaaf6d34ec1bbaa5305f8eead00101b6a7ac6f4d457425d04bcf92e8d7
-
C:\Users\Admin\AppData\Local\Temp\lgTeMaPEZQleQYhFilesize
71KB
MD5dc2b0f48d8f547d5ff7d67b371d850f0
SHA184d02ddbf478bf7cfe9ccb466362860ee18b3839
SHA2560434c46910f48821a0a442b510260a3faea9404d7e6a8edd2cf44cc7dfea3890
SHA5123470ae3db7053a7e606a221f97f8cadf58500a746daaa4c763d714fe99df026d1c7858aaaf6d34ec1bbaa5305f8eead00101b6a7ac6f4d457425d04bcf92e8d7
-
C:\Users\Admin\AppData\Local\Temp\ozFZBsbOJiFilesize
112KB
MD5780853cddeaee8de70f28a4b255a600b
SHA1ad7a5da33f7ad12946153c497e990720b09005ed
SHA2561055ff62de3dea7645c732583242adf4164bdcfb9dd37d9b35bbb9510d59b0a3
SHA512e422863112084bb8d11c682482e780cd63c2f20c8e3a93ed3b9efd1b04d53eb5d3c8081851ca89b74d66f3d9ab48eb5f6c74550484f46e7c6e460a8250c9b1d8
-
C:\Users\Admin\AppData\Local\Temp\pfRFEgmotaFetHsFilesize
71KB
MD5dc2b0f48d8f547d5ff7d67b371d850f0
SHA184d02ddbf478bf7cfe9ccb466362860ee18b3839
SHA2560434c46910f48821a0a442b510260a3faea9404d7e6a8edd2cf44cc7dfea3890
SHA5123470ae3db7053a7e606a221f97f8cadf58500a746daaa4c763d714fe99df026d1c7858aaaf6d34ec1bbaa5305f8eead00101b6a7ac6f4d457425d04bcf92e8d7
-
C:\Users\Admin\AppData\Local\Temp\tNswYNsGRussVmaFilesize
2KB
MD5dd7a4110e2dc0760efdd47ee918c0deb
SHA15ed5efe128e521023e0caf4fff9af747522c8166
SHA256550ad8794d9ec26bc7e09225cb1cbe648ee7c1c2349aabec8172f08bdec26084
SHA512c928725e5f010d371727aadcc057da91378a0b24c66b2848217e9186dd319b6bf09c0859d7bf523ff1736fc41591eb25662a900fbe3977b63132a0c40dcd35dc
-
C:\Users\Admin\AppData\Local\Temp\updOMeRVjaRzLNTFilesize
2KB
MD5dd7a4110e2dc0760efdd47ee918c0deb
SHA15ed5efe128e521023e0caf4fff9af747522c8166
SHA256550ad8794d9ec26bc7e09225cb1cbe648ee7c1c2349aabec8172f08bdec26084
SHA512c928725e5f010d371727aadcc057da91378a0b24c66b2848217e9186dd319b6bf09c0859d7bf523ff1736fc41591eb25662a900fbe3977b63132a0c40dcd35dc
-
C:\Users\Admin\AppData\Local\Temp\updOMeRVjaRzLNTFilesize
2KB
MD5dd7a4110e2dc0760efdd47ee918c0deb
SHA15ed5efe128e521023e0caf4fff9af747522c8166
SHA256550ad8794d9ec26bc7e09225cb1cbe648ee7c1c2349aabec8172f08bdec26084
SHA512c928725e5f010d371727aadcc057da91378a0b24c66b2848217e9186dd319b6bf09c0859d7bf523ff1736fc41591eb25662a900fbe3977b63132a0c40dcd35dc
-
memory/224-390-0x0000000004F00000-0x0000000004F10000-memory.dmpFilesize
64KB
-
memory/224-389-0x0000000004F00000-0x0000000004F10000-memory.dmpFilesize
64KB
-
memory/836-286-0x0000000004E20000-0x0000000004E30000-memory.dmpFilesize
64KB
-
memory/836-287-0x0000000004E20000-0x0000000004E30000-memory.dmpFilesize
64KB
-
memory/928-331-0x0000000004CD0000-0x0000000004CE0000-memory.dmpFilesize
64KB
-
memory/928-332-0x0000000004CD0000-0x0000000004CE0000-memory.dmpFilesize
64KB
-
memory/1336-242-0x0000000002580000-0x0000000002590000-memory.dmpFilesize
64KB
-
memory/1336-241-0x0000000002580000-0x0000000002590000-memory.dmpFilesize
64KB
-
memory/1372-307-0x0000000002310000-0x0000000002320000-memory.dmpFilesize
64KB
-
memory/1372-306-0x0000000002310000-0x0000000002320000-memory.dmpFilesize
64KB
-
memory/1984-227-0x0000000005230000-0x0000000005240000-memory.dmpFilesize
64KB
-
memory/1984-228-0x0000000005230000-0x0000000005240000-memory.dmpFilesize
64KB
-
memory/2124-257-0x0000000002B40000-0x0000000002B50000-memory.dmpFilesize
64KB
-
memory/2124-258-0x0000000002B40000-0x0000000002B50000-memory.dmpFilesize
64KB
-
memory/2296-394-0x0000000002E00000-0x0000000002E10000-memory.dmpFilesize
64KB
-
memory/2348-183-0x00000000025B0000-0x00000000025C0000-memory.dmpFilesize
64KB
-
memory/2348-178-0x00000000025B0000-0x00000000025C0000-memory.dmpFilesize
64KB
-
memory/2660-301-0x00000000052D0000-0x00000000052E0000-memory.dmpFilesize
64KB
-
memory/2660-302-0x00000000052D0000-0x00000000052E0000-memory.dmpFilesize
64KB
-
memory/3180-361-0x0000000005040000-0x0000000005050000-memory.dmpFilesize
64KB
-
memory/3496-198-0x0000000005390000-0x00000000053A0000-memory.dmpFilesize
64KB
-
memory/3636-262-0x00000000025E0000-0x00000000025F0000-memory.dmpFilesize
64KB
-
memory/3724-134-0x00000000057D0000-0x0000000005DF8000-memory.dmpFilesize
6.2MB
-
memory/3724-152-0x0000000006C60000-0x0000000006C82000-memory.dmpFilesize
136KB
-
memory/3724-137-0x0000000005760000-0x0000000005782000-memory.dmpFilesize
136KB
-
memory/3724-135-0x0000000002DC0000-0x0000000002DD0000-memory.dmpFilesize
64KB
-
memory/3724-133-0x0000000005160000-0x0000000005196000-memory.dmpFilesize
216KB
-
memory/3724-153-0x0000000007D10000-0x00000000082B4000-memory.dmpFilesize
5.6MB
-
memory/3724-136-0x0000000002DC0000-0x0000000002DD0000-memory.dmpFilesize
64KB
-
memory/3724-138-0x0000000006030000-0x0000000006096000-memory.dmpFilesize
408KB
-
memory/3724-151-0x0000000006C10000-0x0000000006C2A000-memory.dmpFilesize
104KB
-
memory/3724-150-0x00000000076C0000-0x0000000007756000-memory.dmpFilesize
600KB
-
memory/3724-149-0x0000000006710000-0x000000000672E000-memory.dmpFilesize
120KB
-
memory/3724-139-0x00000000060A0000-0x0000000006106000-memory.dmpFilesize
408KB
-
memory/3784-208-0x0000000004A40000-0x0000000004A50000-memory.dmpFilesize
64KB
-
memory/3784-207-0x0000000004A40000-0x0000000004A50000-memory.dmpFilesize
64KB
-
memory/4352-337-0x0000000002460000-0x0000000002470000-memory.dmpFilesize
64KB
-
memory/4352-336-0x0000000002460000-0x0000000002470000-memory.dmpFilesize
64KB
-
memory/4592-365-0x0000000000FC0000-0x0000000000FD0000-memory.dmpFilesize
64KB
-
memory/4836-408-0x00000000023A0000-0x00000000023B0000-memory.dmpFilesize
64KB
-
memory/4836-409-0x00000000023A0000-0x00000000023B0000-memory.dmpFilesize
64KB
-
memory/4952-169-0x0000000004E80000-0x0000000004E90000-memory.dmpFilesize
64KB