Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 16:25
Static task
static1
Behavioral task
behavioral1
Sample
4b32941cd92e048e6a2d16c6069edf62.exe
Resource
win7-20230220-en
General
-
Target
4b32941cd92e048e6a2d16c6069edf62.exe
-
Size
3.0MB
-
MD5
4b32941cd92e048e6a2d16c6069edf62
-
SHA1
5d167b4588575ffbc7a06cd9fa22552dced38951
-
SHA256
a1dc10eaa3d8eb09dfcb58123a48484639301d86165a8e3c76747cc04a2bf67d
-
SHA512
8b5c75642960991648fd18fb2c5421f8d082f0982a4b5950dd091547dc53943fccb287a404593fbb08282188c3c94d75e05c28f1a58f83a5b6559f34a516442e
-
SSDEEP
98304:6fFbrdnYUGkQqOSlBk1G4QBeKW0wnpTX5OIX:6fFbhBMqOxFgW3nRr
Malware Config
Extracted
aurora
94.142.138.215:8081
Signatures
-
Detects Redline Stealer samples 2 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
Processes:
resource yara_rule behavioral2/memory/1568-144-0x0000000005510000-0x0000000005B38000-memory.dmp redline_stealer behavioral2/memory/1568-149-0x0000000005B40000-0x0000000005BA6000-memory.dmp redline_stealer -
Detects any file with a triage score of 10 4 IoCs
This file has been assigned a triage score of 10, indicating a high likelihood of malicious behavior.
Processes:
resource yara_rule behavioral2/memory/2704-135-0x00000000008F0000-0x0000000001112000-memory.dmp triage_score_10 behavioral2/memory/2704-136-0x00000000008F0000-0x0000000001112000-memory.dmp triage_score_10 behavioral2/memory/2704-137-0x00000000008F0000-0x0000000001112000-memory.dmp triage_score_10 behavioral2/memory/2704-138-0x00000000008F0000-0x0000000001112000-memory.dmp triage_score_10 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
4b32941cd92e048e6a2d16c6069edf62.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4b32941cd92e048e6a2d16c6069edf62.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
4b32941cd92e048e6a2d16c6069edf62.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4b32941cd92e048e6a2d16c6069edf62.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4b32941cd92e048e6a2d16c6069edf62.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Processes:
4b32941cd92e048e6a2d16c6069edf62.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4b32941cd92e048e6a2d16c6069edf62.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
4b32941cd92e048e6a2d16c6069edf62.exepid process 2704 4b32941cd92e048e6a2d16c6069edf62.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Suspicious behavior: EnumeratesProcesses 41 IoCs
Processes:
4b32941cd92e048e6a2d16c6069edf62.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 2704 4b32941cd92e048e6a2d16c6069edf62.exe 2704 4b32941cd92e048e6a2d16c6069edf62.exe 1568 powershell.exe 1568 powershell.exe 1568 powershell.exe 3112 powershell.exe 3112 powershell.exe 3308 powershell.exe 3308 powershell.exe 1820 powershell.exe 1820 powershell.exe 3348 powershell.exe 3348 powershell.exe 4728 powershell.exe 4728 powershell.exe 1652 powershell.exe 1652 powershell.exe 3940 powershell.exe 3940 powershell.exe 452 powershell.exe 452 powershell.exe 448 powershell.exe 448 powershell.exe 3876 powershell.exe 3876 powershell.exe 2252 powershell.exe 2252 powershell.exe 3336 powershell.exe 3336 powershell.exe 4216 powershell.exe 4216 powershell.exe 4132 powershell.exe 4132 powershell.exe 1288 powershell.exe 1288 powershell.exe 2500 powershell.exe 2500 powershell.exe 3856 powershell.exe 3856 powershell.exe 4864 powershell.exe 4864 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exewmic.exedescription pid process Token: SeIncreaseQuotaPrivilege 4064 WMIC.exe Token: SeSecurityPrivilege 4064 WMIC.exe Token: SeTakeOwnershipPrivilege 4064 WMIC.exe Token: SeLoadDriverPrivilege 4064 WMIC.exe Token: SeSystemProfilePrivilege 4064 WMIC.exe Token: SeSystemtimePrivilege 4064 WMIC.exe Token: SeProfSingleProcessPrivilege 4064 WMIC.exe Token: SeIncBasePriorityPrivilege 4064 WMIC.exe Token: SeCreatePagefilePrivilege 4064 WMIC.exe Token: SeBackupPrivilege 4064 WMIC.exe Token: SeRestorePrivilege 4064 WMIC.exe Token: SeShutdownPrivilege 4064 WMIC.exe Token: SeDebugPrivilege 4064 WMIC.exe Token: SeSystemEnvironmentPrivilege 4064 WMIC.exe Token: SeRemoteShutdownPrivilege 4064 WMIC.exe Token: SeUndockPrivilege 4064 WMIC.exe Token: SeManageVolumePrivilege 4064 WMIC.exe Token: 33 4064 WMIC.exe Token: 34 4064 WMIC.exe Token: 35 4064 WMIC.exe Token: 36 4064 WMIC.exe Token: SeIncreaseQuotaPrivilege 4064 WMIC.exe Token: SeSecurityPrivilege 4064 WMIC.exe Token: SeTakeOwnershipPrivilege 4064 WMIC.exe Token: SeLoadDriverPrivilege 4064 WMIC.exe Token: SeSystemProfilePrivilege 4064 WMIC.exe Token: SeSystemtimePrivilege 4064 WMIC.exe Token: SeProfSingleProcessPrivilege 4064 WMIC.exe Token: SeIncBasePriorityPrivilege 4064 WMIC.exe Token: SeCreatePagefilePrivilege 4064 WMIC.exe Token: SeBackupPrivilege 4064 WMIC.exe Token: SeRestorePrivilege 4064 WMIC.exe Token: SeShutdownPrivilege 4064 WMIC.exe Token: SeDebugPrivilege 4064 WMIC.exe Token: SeSystemEnvironmentPrivilege 4064 WMIC.exe Token: SeRemoteShutdownPrivilege 4064 WMIC.exe Token: SeUndockPrivilege 4064 WMIC.exe Token: SeManageVolumePrivilege 4064 WMIC.exe Token: 33 4064 WMIC.exe Token: 34 4064 WMIC.exe Token: 35 4064 WMIC.exe Token: 36 4064 WMIC.exe Token: SeIncreaseQuotaPrivilege 4584 wmic.exe Token: SeSecurityPrivilege 4584 wmic.exe Token: SeTakeOwnershipPrivilege 4584 wmic.exe Token: SeLoadDriverPrivilege 4584 wmic.exe Token: SeSystemProfilePrivilege 4584 wmic.exe Token: SeSystemtimePrivilege 4584 wmic.exe Token: SeProfSingleProcessPrivilege 4584 wmic.exe Token: SeIncBasePriorityPrivilege 4584 wmic.exe Token: SeCreatePagefilePrivilege 4584 wmic.exe Token: SeBackupPrivilege 4584 wmic.exe Token: SeRestorePrivilege 4584 wmic.exe Token: SeShutdownPrivilege 4584 wmic.exe Token: SeDebugPrivilege 4584 wmic.exe Token: SeSystemEnvironmentPrivilege 4584 wmic.exe Token: SeRemoteShutdownPrivilege 4584 wmic.exe Token: SeUndockPrivilege 4584 wmic.exe Token: SeManageVolumePrivilege 4584 wmic.exe Token: 33 4584 wmic.exe Token: 34 4584 wmic.exe Token: 35 4584 wmic.exe Token: 36 4584 wmic.exe Token: SeIncreaseQuotaPrivilege 4584 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4b32941cd92e048e6a2d16c6069edf62.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2704 wrote to memory of 220 2704 4b32941cd92e048e6a2d16c6069edf62.exe cmd.exe PID 2704 wrote to memory of 220 2704 4b32941cd92e048e6a2d16c6069edf62.exe cmd.exe PID 2704 wrote to memory of 220 2704 4b32941cd92e048e6a2d16c6069edf62.exe cmd.exe PID 220 wrote to memory of 4064 220 cmd.exe WMIC.exe PID 220 wrote to memory of 4064 220 cmd.exe WMIC.exe PID 220 wrote to memory of 4064 220 cmd.exe WMIC.exe PID 2704 wrote to memory of 4584 2704 4b32941cd92e048e6a2d16c6069edf62.exe wmic.exe PID 2704 wrote to memory of 4584 2704 4b32941cd92e048e6a2d16c6069edf62.exe wmic.exe PID 2704 wrote to memory of 4584 2704 4b32941cd92e048e6a2d16c6069edf62.exe wmic.exe PID 2704 wrote to memory of 3188 2704 4b32941cd92e048e6a2d16c6069edf62.exe cmd.exe PID 2704 wrote to memory of 3188 2704 4b32941cd92e048e6a2d16c6069edf62.exe cmd.exe PID 2704 wrote to memory of 3188 2704 4b32941cd92e048e6a2d16c6069edf62.exe cmd.exe PID 3188 wrote to memory of 1008 3188 cmd.exe WMIC.exe PID 3188 wrote to memory of 1008 3188 cmd.exe WMIC.exe PID 3188 wrote to memory of 1008 3188 cmd.exe WMIC.exe PID 2704 wrote to memory of 5020 2704 4b32941cd92e048e6a2d16c6069edf62.exe cmd.exe PID 2704 wrote to memory of 5020 2704 4b32941cd92e048e6a2d16c6069edf62.exe cmd.exe PID 2704 wrote to memory of 5020 2704 4b32941cd92e048e6a2d16c6069edf62.exe cmd.exe PID 5020 wrote to memory of 696 5020 cmd.exe WMIC.exe PID 5020 wrote to memory of 696 5020 cmd.exe WMIC.exe PID 5020 wrote to memory of 696 5020 cmd.exe WMIC.exe PID 2704 wrote to memory of 404 2704 4b32941cd92e048e6a2d16c6069edf62.exe cmd.exe PID 2704 wrote to memory of 404 2704 4b32941cd92e048e6a2d16c6069edf62.exe cmd.exe PID 2704 wrote to memory of 404 2704 4b32941cd92e048e6a2d16c6069edf62.exe cmd.exe PID 404 wrote to memory of 3036 404 cmd.exe systeminfo.exe PID 404 wrote to memory of 3036 404 cmd.exe systeminfo.exe PID 404 wrote to memory of 3036 404 cmd.exe systeminfo.exe PID 2704 wrote to memory of 1568 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 1568 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 1568 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 3112 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 3112 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 3112 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 3308 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 3308 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 3308 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 1820 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 1820 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 1820 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 3348 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 3348 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 3348 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 4728 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 4728 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 4728 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 1652 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 1652 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 1652 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 3940 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 3940 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 3940 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 452 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 452 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 452 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 448 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 448 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 448 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 3876 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 3876 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 3876 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 2252 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 2252 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 2252 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe PID 2704 wrote to memory of 3336 2704 4b32941cd92e048e6a2d16c6069edf62.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b32941cd92e048e6a2d16c6069edf62.exe"C:\Users\Admin\AppData\Local\Temp\4b32941cd92e048e6a2d16c6069edf62.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "wmic csproduct get uuid"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name3⤵
-
C:\Windows\SysWOW64\cmd.execmd "/c " systeminfo2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History\" \"C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\MRAjWwhTHctcuAx\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data\" \"C:\Users\Admin\AppData\Local\Temp\hxKQFDaFpL\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\SjFbcXoEFfRsWxP\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies\" \"C:\Users\Admin\AppData\Local\Temp\LDnJObCsNV\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\lgTeMaPEZQleQYh\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Data\" \"C:\Users\Admin\AppData\Local\Temp\YzRyWJjPjz\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\pfRFEgmotaFetHs\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\bZRjxAwnwe\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\krBEmfdzdcEkXBA\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\History\" \"C:\Users\Admin\AppData\Local\Temp\kjQZLCtTMt\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\TCoaNatyyiNKARe\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Login Data\" \"C:\Users\Admin\AppData\Local\Temp\KJyiXJrscc\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\tNswYNsGRussVma\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Web Data\" \"C:\Users\Admin\AppData\Local\Temp\ozFZBsbOJi\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\FQGZsnwTKSmVoiG\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\LOpbUOpEdK\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\updOMeRVjaRzLNT\""2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Windows\History\" \"C:\Users\Admin\AppData\Local\Temp\XYeUCWKsXb\""2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD5def65711d78669d7f8e69313be4acf2e
SHA16522ebf1de09eeb981e270bd95114bc69a49cda6
SHA256aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c
SHA51205b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5066feafd94f006301cc49a71334709fa
SHA1dc52007521fe142cc14d0e9d31866926c44602c2
SHA25679434d2b8b867f4ff97ef1b65861276948cca69ebf8cc4e1f2c22ac19b957e48
SHA5125932b62bdad2f424d8b069e8555ca86172522d1818aac9511ce9252e200c4a1740e1514ac1aced15d310037aa1ea619b39efc69a18a2c4d972062e6d65ed9862
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD57fdc983fe3282d0c96eb913082156771
SHA1ad7644d642ec6cfda3273eb43d34cd0cbbf34a7c
SHA2562604fafde3386cc002206db163aec3dd5587917baaebe919d993ab063350557b
SHA512326aaa9533adacb097931ded155e65b9130caad7cd640dbb6bc221c2ab3b64fcc82a054e7517daabc232670a37b6a30fbccf81bd92564a62c2d7224589c107f4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5f74250418cb0d914fa8b67303840a286
SHA139ebfd3d5d199bc7c7df53db41fcdce06a500649
SHA2563fec57ff458ca9fb5d23f44253aed04649d3ed09fdb95672f9a15ab2d0a95d62
SHA512bac72387574d3d8ff37655a95f686d5a59a78784f7b5696b664a9058592a55a221b0e47cb3ab99c1bac3e9c45983920be95f88d2dc2b135c691c38bea3150a57
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD565335829d8c4803fdb157953d49c03e1
SHA1f494dea99c43ca6804325c2b5308bf31232754b7
SHA25647b5c30d3ce2f8c98c45a4868810c40f1fcef431a1f02c061d5c52dbd20bcdb5
SHA5120926a3396df90353d4d20de135ab3ea6d4700c12d0a6e2cf1af6d6ebb6ecfa23d29113772476b8ea36970d6edfe5378ad6382ab630b0f2ec935cb4b077bd27f5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5bd622e267e6a2ca20200cffd2dd2ad7f
SHA1c796cd3dc03bffae63e0be27228263167760f203
SHA25620a957da217d2d3d4202c2310369548ffa6d0bfff091b09f06a58e0a8663e63d
SHA512e3d9de1845bcf6940628879d8ec2b12073814ff7b106f5b383faccc01cc86f6e9e55402835ca4b721fabf5032d97ee45865aa9192954cc3c24975b8592621ad3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5d4fa188a675e77709da1f6b74574f58a
SHA176ff80b4554fe2994370b7a0172226bb948f7822
SHA256d521e56c6471b9b11f6c87ccb7642e156d210ce4c12cc977b8b7f47cc640fae7
SHA512c7ee3ae4fc241ee70b954ea9347b77f411742a84e766fdaeaed995f9afc6806212b6b352f803866b2747f8f78b8c7c74c4be92cb77a58c9c9f5162f2106229e3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD51830b53bdcb6ae8301882587a9816418
SHA11b981f33804d669e24de03c7cc8318523461d6b1
SHA256cb55065ab5aa848d6159fca38cbe7e924c4d635caf374f63ea91579db4de729f
SHA512678090b68ac987e92ec2a2928b11750e620f4040f5565c91e25afa40a45faf0f9dd18d3cd5bcd371f03fccc4ec1fd607c7bb07c3857ec3f35021bab19a0a1fc1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD503d5cfa9c2ceef3d7c7acf7ca840b6ee
SHA1df2fa801d0741a3f61803145e4500f136d990655
SHA25609c6d5480701a060174d9ff23ee7921a17c7e8d118c9e49850f20dfaeca49e81
SHA512ac41fac1c665c08974d8dbe3074b2ce7a17d4cc4c5173d878778b206e43dda2fb879ba82d3088966431b690b700fd0a1f3be3ea7c02b86a55da33e7d22ec211a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD59cdbc2a49f25ae629e8f10d16c27380d
SHA131f864e4b30b72f8f1b38f4d0429703efc78940f
SHA2565462804d6a5e7c424ab72b0a89bcfd794183e2d1a8fb16469d3fe3b99986b606
SHA512342bb60df3d36827c56d40e93698e6d3d8024a8ff3763445b24941d30e6fa44093a6970fd56f35930227007d1bb90d5dd2a0823d153b0fc9ce2dd5153b1cc149
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD56d7d197e507ab550bbbaaf3e5e9d10ea
SHA12963ef45e742a9b42a285eb0b6c0119ad9549518
SHA2566bc4256f6c86425161324e49090c120cb47f52cd652b395767c101af018553d9
SHA512065ff8c9a7e0a2ec2825edc2df55ca1324f46f7db34cb7b61ba2f751b852a07bbfb879c5e6b4e9c84a163b46c73e828d267caaa4085910769083a595def64fec
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5e68b92ac5130002710f74132c5e9e5c5
SHA13ccd990c62b72973e6fb010edc7a50bc2cbecb36
SHA256fefe0b7f7cca54c734af603358869510277b0c3a5d418af4eddeb68a2087b5ce
SHA512a60a552f2796621d7e20baa63458a8af74c073ac9b9a0afd0111908864a403ca54b7ce2a28cc2a317c67e508a0e269b027daef6a589d1128f7578a647c6c9ca7
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5f8fb79c1622fcd4a0a0853920c18d586
SHA18acc1ae46100c8c134d411cbd7f1cbf9794435a1
SHA256cfe50028d8a4699e5c6468b9ba5fe73e6b2f6a6cfb377d732cb04ed5b36634af
SHA5126defe02589e75f309e45ab2e5671f0178f8d6939d3bbd349bf4f8f3f0b56b0897e38bec85f04936f468e64a2e9a9ae9f5998a79c40c424c14a122acc2bbdff32
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5d5f5c569b9a9959e796e990575ce38f0
SHA19128d3e691bbedc91aaec74308278d1cd8703923
SHA256d2e85677217fd9f9010a7858524efc6a6be6f41e4668bb25d5ad6ee272ad86b3
SHA512c0b23e3925e75f9d8d43589b4c3d8b066148447cbf0ff13e1610056246c9c8b0bcab4dd5d4c5e63c3d05dc77089095dc54d7d98a4edb333d035796639b641dee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD59b6c138dbc368faa08cce05ae078c51e
SHA14612e0bc93f8b75d85ce22fb7343b06ed206b6f6
SHA256d5dfd6a29155bf192cd93228d29b0099087395e050b3a8b9c0f4de6c289131b1
SHA512c6dd34bb7d1967036cdae9d23092108e3b810eab4eb1695e9379ddc09dd437b0ec9417a0e5f18582f38b0fc5024857c324eaa2de2800fc54aad342673c3c7ea4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD53b180826f7eaf4264b97dd78e04187a0
SHA197d85fc0cc907575b4fd0ac501ff646d2b7f847f
SHA256ddbf6a4f180973eaad11408d9114d5daecb144879c10e27912441f994c459416
SHA512d56ddf5fb78ee253190ec8c142bdf6ac594760945a44f3fd4bf3fe6fd1de0cc4e4b58c80ebfc5004525a1dfb2760a8df57d9beaada1774f2973750b22a218ec5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD508c172dc3bdee95f1d39184bc2eb8f7e
SHA1e0a99f948016fa83bd9cd50b6358b71c405799b9
SHA2567e0e5068cc38a3faf878d9011c76bf18683092292b775d57ca25928902f02527
SHA5127706616ac6c097c7428df6e04614068cc4d255b3af1a45a570c4a7bc709d976d174c9ddcd3e9260fd3a2d0d020bccdf1119b7f71b76e9eb75a6aa5f0edd3c6d3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5d9f8abc4537e38501f4d205ec7c7e5d9
SHA1225f38155865ceeeea793d5fe30c4ceb89e73726
SHA256c9638d9300b13a2ca8ed00ce3e730d907c37450547595b74c2484112bee184b7
SHA51284dafc660364659e2a602ad3b97e6cdeb902284be7902a57c95da8634d4c176350ed3cc25637457d904f658e7ee96435a09baba266cc764b66f213ee082a33af
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD54c5d5198e8e7b4ea6bab44f119f2af70
SHA1e38786be5ec85dfaf2439e805ea86ebb2184935e
SHA25688b33df67420db2957f13396e2c81679a93c264acb6126622d674fa01d3e4886
SHA512b5126be3e85063b2a7e0a82405d5646d8689960e9976db3480b73f3378679dad5c4cd131f83a827ed9a7b38d7e44a8f12e42422f28197fa68c869abbb79c706c
-
C:\Users\Admin\AppData\Local\Temp\FQGZsnwTKSmVoiGFilesize
2KB
MD577e31b1123e94ce5720ceb729a425798
SHA12b65c95f27d8dca23864a3ed4f78490039ae27bf
SHA25668cafb091d3642a1ad2440bdb51834086945ded836ea25c8f75de7e5fc568d85
SHA5129c660381b859040e20745a1cf42646af3bd3780e2795a5ff3cedc61db9877b608d1fc431a1bd3ba3f25dd3643898b1c0f2abfc067c6634e4ce65de2d4c0c724a
-
C:\Users\Admin\AppData\Local\Temp\KJyiXJrsccFilesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
C:\Users\Admin\AppData\Local\Temp\LDnJObCsNVFilesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
C:\Users\Admin\AppData\Local\Temp\LOpbUOpEdKFilesize
2KB
MD577e31b1123e94ce5720ceb729a425798
SHA12b65c95f27d8dca23864a3ed4f78490039ae27bf
SHA25668cafb091d3642a1ad2440bdb51834086945ded836ea25c8f75de7e5fc568d85
SHA5129c660381b859040e20745a1cf42646af3bd3780e2795a5ff3cedc61db9877b608d1fc431a1bd3ba3f25dd3643898b1c0f2abfc067c6634e4ce65de2d4c0c724a
-
C:\Users\Admin\AppData\Local\Temp\MRAjWwhTHctcuAxFilesize
71KB
MD5386c014d0948d4fc41afa98cfca9022e
SHA1786cc52d9b962f55f92202c7d50c3707eb62607b
SHA256448b329f3a10bbe3e8f86cd91509c2783b63d28a375231eb23724f5e141420f2
SHA51213d46209c6b052977d6242763b54ac5e35b389e765c82ba773b520ebf5eacabdfdc22b642cb9760e39ad59dd82fa40a31a8d41fd6dd7ea9c9ad08c57b7d8150f
-
C:\Users\Admin\AppData\Local\Temp\SjFbcXoEFfRsWxPFilesize
71KB
MD5386c014d0948d4fc41afa98cfca9022e
SHA1786cc52d9b962f55f92202c7d50c3707eb62607b
SHA256448b329f3a10bbe3e8f86cd91509c2783b63d28a375231eb23724f5e141420f2
SHA51213d46209c6b052977d6242763b54ac5e35b389e765c82ba773b520ebf5eacabdfdc22b642cb9760e39ad59dd82fa40a31a8d41fd6dd7ea9c9ad08c57b7d8150f
-
C:\Users\Admin\AppData\Local\Temp\TCoaNatyyiNKAReFilesize
2KB
MD577e31b1123e94ce5720ceb729a425798
SHA12b65c95f27d8dca23864a3ed4f78490039ae27bf
SHA25668cafb091d3642a1ad2440bdb51834086945ded836ea25c8f75de7e5fc568d85
SHA5129c660381b859040e20745a1cf42646af3bd3780e2795a5ff3cedc61db9877b608d1fc431a1bd3ba3f25dd3643898b1c0f2abfc067c6634e4ce65de2d4c0c724a
-
C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiCFilesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
C:\Users\Admin\AppData\Local\Temp\YzRyWJjPjzFilesize
92KB
MD5367544a2a5551a41c869eb1b0b5871c3
SHA19051340b95090c07deda0a1df3a9c0b9233f5054
SHA256eb0e2b2ee04cab66e2f7930ea82a5f1b42469ac50e063a8492f9c585f90bc542
SHA5126d1275291530cb8b9944db296c4aed376765015ad6bbf51f4475a347776c99dbb2e748d0c331d89c9e6118adf641ed10e390c8ccb8ae4de4811c858d195cc34c
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lnvv42pf.zsf.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\bZRjxAwnweFilesize
71KB
MD5386c014d0948d4fc41afa98cfca9022e
SHA1786cc52d9b962f55f92202c7d50c3707eb62607b
SHA256448b329f3a10bbe3e8f86cd91509c2783b63d28a375231eb23724f5e141420f2
SHA51213d46209c6b052977d6242763b54ac5e35b389e765c82ba773b520ebf5eacabdfdc22b642cb9760e39ad59dd82fa40a31a8d41fd6dd7ea9c9ad08c57b7d8150f
-
C:\Users\Admin\AppData\Local\Temp\bZRjxAwnweFilesize
71KB
MD5386c014d0948d4fc41afa98cfca9022e
SHA1786cc52d9b962f55f92202c7d50c3707eb62607b
SHA256448b329f3a10bbe3e8f86cd91509c2783b63d28a375231eb23724f5e141420f2
SHA51213d46209c6b052977d6242763b54ac5e35b389e765c82ba773b520ebf5eacabdfdc22b642cb9760e39ad59dd82fa40a31a8d41fd6dd7ea9c9ad08c57b7d8150f
-
C:\Users\Admin\AppData\Local\Temp\hxKQFDaFpLFilesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
C:\Users\Admin\AppData\Local\Temp\kjQZLCtTMtFilesize
124KB
MD59618e15b04a4ddb39ed6c496575f6f95
SHA11c28f8750e5555776b3c80b187c5d15a443a7412
SHA256a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab
SHA512f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26
-
C:\Users\Admin\AppData\Local\Temp\krBEmfdzdcEkXBAFilesize
71KB
MD5386c014d0948d4fc41afa98cfca9022e
SHA1786cc52d9b962f55f92202c7d50c3707eb62607b
SHA256448b329f3a10bbe3e8f86cd91509c2783b63d28a375231eb23724f5e141420f2
SHA51213d46209c6b052977d6242763b54ac5e35b389e765c82ba773b520ebf5eacabdfdc22b642cb9760e39ad59dd82fa40a31a8d41fd6dd7ea9c9ad08c57b7d8150f
-
C:\Users\Admin\AppData\Local\Temp\lgTeMaPEZQleQYhFilesize
71KB
MD5386c014d0948d4fc41afa98cfca9022e
SHA1786cc52d9b962f55f92202c7d50c3707eb62607b
SHA256448b329f3a10bbe3e8f86cd91509c2783b63d28a375231eb23724f5e141420f2
SHA51213d46209c6b052977d6242763b54ac5e35b389e765c82ba773b520ebf5eacabdfdc22b642cb9760e39ad59dd82fa40a31a8d41fd6dd7ea9c9ad08c57b7d8150f
-
C:\Users\Admin\AppData\Local\Temp\ozFZBsbOJiFilesize
112KB
MD5780853cddeaee8de70f28a4b255a600b
SHA1ad7a5da33f7ad12946153c497e990720b09005ed
SHA2561055ff62de3dea7645c732583242adf4164bdcfb9dd37d9b35bbb9510d59b0a3
SHA512e422863112084bb8d11c682482e780cd63c2f20c8e3a93ed3b9efd1b04d53eb5d3c8081851ca89b74d66f3d9ab48eb5f6c74550484f46e7c6e460a8250c9b1d8
-
C:\Users\Admin\AppData\Local\Temp\pfRFEgmotaFetHsFilesize
71KB
MD5386c014d0948d4fc41afa98cfca9022e
SHA1786cc52d9b962f55f92202c7d50c3707eb62607b
SHA256448b329f3a10bbe3e8f86cd91509c2783b63d28a375231eb23724f5e141420f2
SHA51213d46209c6b052977d6242763b54ac5e35b389e765c82ba773b520ebf5eacabdfdc22b642cb9760e39ad59dd82fa40a31a8d41fd6dd7ea9c9ad08c57b7d8150f
-
C:\Users\Admin\AppData\Local\Temp\tNswYNsGRussVmaFilesize
2KB
MD577e31b1123e94ce5720ceb729a425798
SHA12b65c95f27d8dca23864a3ed4f78490039ae27bf
SHA25668cafb091d3642a1ad2440bdb51834086945ded836ea25c8f75de7e5fc568d85
SHA5129c660381b859040e20745a1cf42646af3bd3780e2795a5ff3cedc61db9877b608d1fc431a1bd3ba3f25dd3643898b1c0f2abfc067c6634e4ce65de2d4c0c724a
-
C:\Users\Admin\AppData\Local\Temp\updOMeRVjaRzLNTFilesize
2KB
MD577e31b1123e94ce5720ceb729a425798
SHA12b65c95f27d8dca23864a3ed4f78490039ae27bf
SHA25668cafb091d3642a1ad2440bdb51834086945ded836ea25c8f75de7e5fc568d85
SHA5129c660381b859040e20745a1cf42646af3bd3780e2795a5ff3cedc61db9877b608d1fc431a1bd3ba3f25dd3643898b1c0f2abfc067c6634e4ce65de2d4c0c724a
-
C:\Users\Admin\AppData\Local\Temp\updOMeRVjaRzLNTFilesize
2KB
MD577e31b1123e94ce5720ceb729a425798
SHA12b65c95f27d8dca23864a3ed4f78490039ae27bf
SHA25668cafb091d3642a1ad2440bdb51834086945ded836ea25c8f75de7e5fc568d85
SHA5129c660381b859040e20745a1cf42646af3bd3780e2795a5ff3cedc61db9877b608d1fc431a1bd3ba3f25dd3643898b1c0f2abfc067c6634e4ce65de2d4c0c724a
-
memory/448-292-0x0000000002C90000-0x0000000002CA0000-memory.dmpFilesize
64KB
-
memory/448-291-0x0000000002C90000-0x0000000002CA0000-memory.dmpFilesize
64KB
-
memory/452-276-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/452-277-0x0000000004DD0000-0x0000000004DE0000-memory.dmpFilesize
64KB
-
memory/1288-391-0x0000000003120000-0x0000000003130000-memory.dmpFilesize
64KB
-
memory/1288-392-0x0000000003120000-0x0000000003130000-memory.dmpFilesize
64KB
-
memory/1568-162-0x0000000006760000-0x000000000677A000-memory.dmpFilesize
104KB
-
memory/1568-146-0x0000000002B10000-0x0000000002B20000-memory.dmpFilesize
64KB
-
memory/1568-161-0x00000000067D0000-0x0000000006866000-memory.dmpFilesize
600KB
-
memory/1568-163-0x0000000006870000-0x0000000006892000-memory.dmpFilesize
136KB
-
memory/1568-143-0x0000000002940000-0x0000000002976000-memory.dmpFilesize
216KB
-
memory/1568-144-0x0000000005510000-0x0000000005B38000-memory.dmpFilesize
6.2MB
-
memory/1568-159-0x0000000006270000-0x000000000628E000-memory.dmpFilesize
120KB
-
memory/1568-149-0x0000000005B40000-0x0000000005BA6000-memory.dmpFilesize
408KB
-
memory/1568-145-0x0000000002B10000-0x0000000002B20000-memory.dmpFilesize
64KB
-
memory/1568-164-0x0000000007A30000-0x0000000007FD4000-memory.dmpFilesize
5.6MB
-
memory/1568-148-0x0000000005470000-0x00000000054D6000-memory.dmpFilesize
408KB
-
memory/1568-147-0x00000000053D0000-0x00000000053F2000-memory.dmpFilesize
136KB
-
memory/1652-247-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/1652-246-0x0000000004B10000-0x0000000004B20000-memory.dmpFilesize
64KB
-
memory/1820-211-0x0000000004EF0000-0x0000000004F00000-memory.dmpFilesize
64KB
-
memory/1820-210-0x0000000004EF0000-0x0000000004F00000-memory.dmpFilesize
64KB
-
memory/2252-331-0x0000000004A50000-0x0000000004A60000-memory.dmpFilesize
64KB
-
memory/2252-332-0x0000000004A50000-0x0000000004A60000-memory.dmpFilesize
64KB
-
memory/2500-406-0x0000000002600000-0x0000000002610000-memory.dmpFilesize
64KB
-
memory/2500-407-0x0000000002600000-0x0000000002610000-memory.dmpFilesize
64KB
-
memory/2704-346-0x00000000008F0000-0x0000000001112000-memory.dmpFilesize
8.1MB
-
memory/2704-133-0x00000000008F0000-0x0000000001112000-memory.dmpFilesize
8.1MB
-
memory/2704-443-0x00000000008F0000-0x0000000001112000-memory.dmpFilesize
8.1MB
-
memory/2704-142-0x00000000008F0000-0x0000000001112000-memory.dmpFilesize
8.1MB
-
memory/2704-137-0x00000000008F0000-0x0000000001112000-memory.dmpFilesize
8.1MB
-
memory/2704-134-0x00000000008F0000-0x0000000001112000-memory.dmpFilesize
8.1MB
-
memory/2704-160-0x00000000008F0000-0x0000000001112000-memory.dmpFilesize
8.1MB
-
memory/2704-138-0x00000000008F0000-0x0000000001112000-memory.dmpFilesize
8.1MB
-
memory/2704-213-0x00000000008F0000-0x0000000001112000-memory.dmpFilesize
8.1MB
-
memory/2704-139-0x00000000008F0000-0x0000000001112000-memory.dmpFilesize
8.1MB
-
memory/2704-408-0x00000000008F0000-0x0000000001112000-memory.dmpFilesize
8.1MB
-
memory/2704-141-0x00000000008F0000-0x0000000001112000-memory.dmpFilesize
8.1MB
-
memory/2704-140-0x00000000008F0000-0x0000000001112000-memory.dmpFilesize
8.1MB
-
memory/2704-135-0x00000000008F0000-0x0000000001112000-memory.dmpFilesize
8.1MB
-
memory/2704-136-0x00000000008F0000-0x0000000001112000-memory.dmpFilesize
8.1MB
-
memory/2704-275-0x00000000008F0000-0x0000000001112000-memory.dmpFilesize
8.1MB
-
memory/3112-180-0x0000000004BE0000-0x0000000004BF0000-memory.dmpFilesize
64KB
-
memory/3112-181-0x0000000004BE0000-0x0000000004BF0000-memory.dmpFilesize
64KB
-
memory/3308-195-0x00000000049B0000-0x00000000049C0000-memory.dmpFilesize
64KB
-
memory/3308-196-0x00000000049B0000-0x00000000049C0000-memory.dmpFilesize
64KB
-
memory/3336-348-0x0000000002A70000-0x0000000002A80000-memory.dmpFilesize
64KB
-
memory/3336-347-0x0000000002A70000-0x0000000002A80000-memory.dmpFilesize
64KB
-
memory/3348-226-0x00000000052D0000-0x00000000052E0000-memory.dmpFilesize
64KB
-
memory/3348-227-0x00000000052D0000-0x00000000052E0000-memory.dmpFilesize
64KB
-
memory/3856-422-0x0000000002F60000-0x0000000002F70000-memory.dmpFilesize
64KB
-
memory/3856-421-0x0000000002F60000-0x0000000002F70000-memory.dmpFilesize
64KB
-
memory/3876-316-0x00000000029C0000-0x00000000029D0000-memory.dmpFilesize
64KB
-
memory/3876-317-0x00000000029C0000-0x00000000029D0000-memory.dmpFilesize
64KB
-
memory/3940-271-0x0000000002620000-0x0000000002630000-memory.dmpFilesize
64KB
-
memory/4132-377-0x00000000030F0000-0x0000000003100000-memory.dmpFilesize
64KB
-
memory/4216-363-0x00000000050B0000-0x00000000050C0000-memory.dmpFilesize
64KB
-
memory/4216-362-0x00000000050B0000-0x00000000050C0000-memory.dmpFilesize
64KB
-
memory/4728-231-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/4728-232-0x0000000004D00000-0x0000000004D10000-memory.dmpFilesize
64KB
-
memory/4864-436-0x0000000005440000-0x0000000005450000-memory.dmpFilesize
64KB
-
memory/4864-437-0x0000000005440000-0x0000000005450000-memory.dmpFilesize
64KB