Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 07:24
Static task
static1
Behavioral task
behavioral1
Sample
1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe
Resource
win7-20240221-en
General
-
Target
1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe
-
Size
4.4MB
-
MD5
fd37327f6c3016a4621c4ed4d499dbc2
-
SHA1
630c9b0dd6b29641e70b36a1c4a62eff874ef845
-
SHA256
1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb
-
SHA512
11630832ae114099d2181be3b775ce40830a199da92113c72d3efc9d0739895aaad13fb071ed3f155444d85c4fb30d652ad5a82bb13fa22de0cbeb573a9a192a
-
SSDEEP
98304:Dws2ANnKXOaeOgmhy0Rmn9zd308KDG235p:FKXbeO77S2pp
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2556-20-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2556-21-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2460-46-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2460-43-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit behavioral1/memory/2460-49-0x0000000010000000-0x00000000101B6000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 6 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\259403423.txt family_gh0strat behavioral1/memory/2556-20-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2556-21-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2460-46-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2460-43-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat behavioral1/memory/2460-49-0x0000000010000000-0x00000000101B6000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
Processes:
TXPlatfor.exedescription ioc process File created C:\Windows\system32\drivers\QAssist.sys TXPlatfor.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
R.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Remote Data\Parameters\ServiceDll = "C:\\Windows\\system32\\259403423.txt" R.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
TXPlatfor.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\QAssist\ImagePath = "system32\\DRIVERS\\QAssist.sys" TXPlatfor.exe -
Executes dropped EXE 6 IoCs
Processes:
R.exeN.exeTXPlatfor.exeTXPlatfor.exeHD_1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exeRemote Data.exepid process 2220 R.exe 2556 N.exe 2260 TXPlatfor.exe 2460 TXPlatfor.exe 2564 HD_1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe 1528 Remote Data.exe -
Loads dropped DLL 9 IoCs
Processes:
1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exeR.exesvchost.exeTXPlatfor.exeRemote Data.exeHD_1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exepid process 2204 1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe 2220 R.exe 3044 svchost.exe 2204 1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe 2260 TXPlatfor.exe 2204 1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe 3044 svchost.exe 1528 Remote Data.exe 2564 HD_1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe -
Processes:
resource yara_rule behavioral1/memory/2556-20-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2556-21-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2556-18-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2460-46-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2460-43-0x0000000010000000-0x00000000101B6000-memory.dmp upx behavioral1/memory/2460-49-0x0000000010000000-0x00000000101B6000-memory.dmp upx -
Drops file in System32 directory 6 IoCs
Processes:
R.exesvchost.exeN.exedescription ioc process File created C:\Windows\SysWOW64\259403423.txt R.exe File opened for modification C:\Windows\SysWOW64\ini.ini R.exe File created C:\Windows\SysWOW64\Remote Data.exe svchost.exe File opened for modification C:\Windows\SysWOW64\Remote Data.exe svchost.exe File created C:\Windows\SysWOW64\TXPlatfor.exe N.exe File opened for modification C:\Windows\SysWOW64\TXPlatfor.exe N.exe -
Processes:
IEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD77A6C1-1B30-11EF-A34E-5E73522EB9B5} = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "422870138" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exepid process 2204 1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
TXPlatfor.exepid process 2460 TXPlatfor.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
N.exeTXPlatfor.exedescription pid process Token: SeIncBasePriorityPrivilege 2556 N.exe Token: SeLoadDriverPrivilege 2460 TXPlatfor.exe Token: 33 2460 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 2460 TXPlatfor.exe Token: 33 2460 TXPlatfor.exe Token: SeIncBasePriorityPrivilege 2460 TXPlatfor.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
IEXPLORE.EXEpid process 2936 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exeIEXPLORE.EXEIEXPLORE.EXEpid process 2204 1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe 2204 1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe 2936 IEXPLORE.EXE 2936 IEXPLORE.EXE 1048 IEXPLORE.EXE 1048 IEXPLORE.EXE 1048 IEXPLORE.EXE 1048 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exeTXPlatfor.exeN.execmd.exesvchost.exeHD_1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exeiexplore.exeIEXPLORE.EXEdescription pid process target process PID 2204 wrote to memory of 2220 2204 1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe R.exe PID 2204 wrote to memory of 2220 2204 1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe R.exe PID 2204 wrote to memory of 2220 2204 1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe R.exe PID 2204 wrote to memory of 2220 2204 1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe R.exe PID 2204 wrote to memory of 2556 2204 1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe N.exe PID 2204 wrote to memory of 2556 2204 1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe N.exe PID 2204 wrote to memory of 2556 2204 1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe N.exe PID 2204 wrote to memory of 2556 2204 1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe N.exe PID 2204 wrote to memory of 2556 2204 1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe N.exe PID 2204 wrote to memory of 2556 2204 1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe N.exe PID 2204 wrote to memory of 2556 2204 1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe N.exe PID 2260 wrote to memory of 2460 2260 TXPlatfor.exe TXPlatfor.exe PID 2260 wrote to memory of 2460 2260 TXPlatfor.exe TXPlatfor.exe PID 2260 wrote to memory of 2460 2260 TXPlatfor.exe TXPlatfor.exe PID 2260 wrote to memory of 2460 2260 TXPlatfor.exe TXPlatfor.exe PID 2260 wrote to memory of 2460 2260 TXPlatfor.exe TXPlatfor.exe PID 2260 wrote to memory of 2460 2260 TXPlatfor.exe TXPlatfor.exe PID 2260 wrote to memory of 2460 2260 TXPlatfor.exe TXPlatfor.exe PID 2556 wrote to memory of 2588 2556 N.exe cmd.exe PID 2556 wrote to memory of 2588 2556 N.exe cmd.exe PID 2556 wrote to memory of 2588 2556 N.exe cmd.exe PID 2556 wrote to memory of 2588 2556 N.exe cmd.exe PID 2204 wrote to memory of 2564 2204 1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe HD_1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe PID 2204 wrote to memory of 2564 2204 1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe HD_1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe PID 2204 wrote to memory of 2564 2204 1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe HD_1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe PID 2204 wrote to memory of 2564 2204 1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe HD_1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe PID 2588 wrote to memory of 2504 2588 cmd.exe PING.EXE PID 2588 wrote to memory of 2504 2588 cmd.exe PING.EXE PID 2588 wrote to memory of 2504 2588 cmd.exe PING.EXE PID 2588 wrote to memory of 2504 2588 cmd.exe PING.EXE PID 3044 wrote to memory of 1528 3044 svchost.exe Remote Data.exe PID 3044 wrote to memory of 1528 3044 svchost.exe Remote Data.exe PID 3044 wrote to memory of 1528 3044 svchost.exe Remote Data.exe PID 3044 wrote to memory of 1528 3044 svchost.exe Remote Data.exe PID 2564 wrote to memory of 2920 2564 HD_1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe iexplore.exe PID 2564 wrote to memory of 2920 2564 HD_1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe iexplore.exe PID 2564 wrote to memory of 2920 2564 HD_1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe iexplore.exe PID 2564 wrote to memory of 2920 2564 HD_1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe iexplore.exe PID 2920 wrote to memory of 2936 2920 iexplore.exe IEXPLORE.EXE PID 2920 wrote to memory of 2936 2920 iexplore.exe IEXPLORE.EXE PID 2920 wrote to memory of 2936 2920 iexplore.exe IEXPLORE.EXE PID 2920 wrote to memory of 2936 2920 iexplore.exe IEXPLORE.EXE PID 2936 wrote to memory of 1048 2936 IEXPLORE.EXE IEXPLORE.EXE PID 2936 wrote to memory of 1048 2936 IEXPLORE.EXE IEXPLORE.EXE PID 2936 wrote to memory of 1048 2936 IEXPLORE.EXE IEXPLORE.EXE PID 2936 wrote to memory of 1048 2936 IEXPLORE.EXE IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe"C:\Users\Admin\AppData\Local\Temp\1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\R.exeC:\Users\Admin\AppData\Local\Temp\\R.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\N.exeC:\Users\Admin\AppData\Local\Temp\\N.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\N.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\HD_1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exeC:\Users\Admin\AppData\Local\Temp\HD_1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://se.360.cn/3⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://se.360.cn/4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2936 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1048
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵PID:2928
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "Remote Data"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\Remote Data.exe"C:\Windows\system32\Remote Data.exe" "c:\windows\system32\259403423.txt",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1528
-
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -auto1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\TXPlatfor.exeC:\Windows\SysWOW64\TXPlatfor.exe -acsi2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCCFilesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2D993E9BDDFC2D49E19866F11A7E662_43DCCF227183B9543AAC74CC532273B7Filesize
471B
MD576dd6e200fb996a375cab42659ae931b
SHA1287c29f22f5937d1c2f3845298ff6937de65b7d0
SHA256f9e4a812d0b7d3fc2e78b512980003449a01352e387ca012e682d086d115c59b
SHA5127904b0f4157f054f8a0879b9a0404e7920dc0519002fbd98e9147c83477a547e4c6263a713e088a7e194bedfa7489a5335f57d881b80cc7f8f6b5e4a644ff241
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCCFilesize
252B
MD5dc93c82d958e44f3c264562cdb5538fa
SHA179573910ca9f876c43c1a2629bac82252f5cc8d2
SHA25687ad861ad67093f6822c3d3de507ac129c7c2166bb3d3eeb0968253756d28d42
SHA5125a0e306e4425694df61e67e778348cb7329f9a61b934133175a3da31b4b4ded809dbfa0ea4167bcc01e98ee8b345da112584325db1153b72624aaeba6c427957
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD551561efe3cbb02e6c5b4146f306a9333
SHA19e97fdc8833b9b8583fc9bb73bfe5074694a053f
SHA256036f9e05e085b4e8dbeacd0d6392993ac850de11625a07031ddd22ee5d1db18d
SHA51200ced315ec381d5ad1e09aaf6f10532a3ae482bf53c9960adc6f16b42173f4ffc18dd42676d77b40da971e98c084df18b2dd9650491bd8ee054ae1637686e2ff
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c4d3374c2de4cc0973c27beed1a63970
SHA12e5469f9458c16d2e0e58531de804a6c854d2dea
SHA256e6093656cd723a26c69367e50d9726ac329c9f29614c384f6b6485e0baa9da4f
SHA512717869f0f7ae8e5f177c68266987d0ed95a5bcd8ca42c59a9cb2d0ff2dc56ab27283d20552505bcf22781a053198f095048b3297e0c3265339588eca8744aef1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD506aa77b0ad5a93294265b4d76a42fee6
SHA16da1f476caa8ce186344bbcbb5860c14da12a25e
SHA2564612b92c54a65126e936cbc656885ba24a45e5c6615bfaa10182955b439c3f54
SHA512e8454753a52851a1f4fa58d65ded72fae755f5f712683f3aeb13e560e06bd429f3f43f96af92fc9aaf0d4ea10aca107404b11df387d2d7fb6afb3b7b44f6267a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e24f58dccc54122be5d2f38044157d96
SHA1906bb30ce921be2656b7126fb424914bc36d4f72
SHA25628324a5cee6cdd8ae6b8854c8e25b98544b170fcb9e6e4c51a39552c961aa90b
SHA512ad7c7fd7a86995d4cd67c280afe82f54ba4d04881e309b9b29f7c37078cf388bab72b6f8388dd8d955d8bf97b8d7e49decca8bdd47a85ec9ab02846ce461ba5e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57c63a530e7e8f0d7d5c6e1f21a515861
SHA1c7614dc0e7a5df78279d5fb4951e59db47a69866
SHA2567ae499470556ec299b62f8933d634bf180bf64fe38f8460c89f33e5f9465f891
SHA512f79c09da7cd352211790c6cfd837c396a0dee296673b304345e16aa5b758b833b35036f79fa6cd7e543a787c5d3cf8338cdc396a45e65dc36e4e0f539224471d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5bb136f6b8639659c64ea1841e617d92e
SHA1e083ab289aaeb173220ca99fdc45143c84ce540d
SHA256df7e3ab74f6cbea4c53b67be8aa9d176ac53fa73a48ca8736b5f65536e79108d
SHA512e2f006cee0960e0dc23fad36d582f6a7e5c07aa139980f250fb4b62c9176a7f954f77a2454cb721dcb5ab14c621faa31e072b5393dae80e1ba12066bb9ed3e6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD570602450e8742a0db25e5f3dff7a6a99
SHA1b71fc2ff8f35f35ea4e9bbc2091c224efe9b8d3a
SHA25641c5470f36f2a533e040fa356ee608b4fa03cecb131b9e7cc31c2d1b2e6a6ce9
SHA512cd82214e4108fcad1cd4c93ed8d2ca459bcbe559b0eaf5eaccd5cdc7e80538a974db88cd6f7016ffb5dc657edf4028b7fff84ab7e8305de4dddf1c6a621164a1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c8c448cca9854e0caeec4d1e0ad105f3
SHA127699b627fe768f9367d99ffcddc7779745a8272
SHA2562d98e08694571f9c75570ae198e7d04f9ed32b6fc9658d595be54d9e479eebde
SHA51216c30f1d4cbac1ef0ad40e7a57194e9e12b5ed3e1876b14d6a1fae8a4133b19234f578eefc59079c6f1f5053ae784e859075992c4c6a34bcad4d22237a1ec28a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD579be590d11deafc43acc6b75fa991334
SHA1ed1a529384cfd9582e4214c6f5c220339db8ef8d
SHA256b9007f0e7cbcacbf9930406fe8b13e66033536a46fab1525d5cd9ea9d4466b76
SHA5125549ea244b1e68cb9b8341206b7ada849adbebbb7091e2bf8cdf3344a2d054471bb93052548ddceca7507d0a6fbc1da8bb62b865f24275426f4045091205a8bf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51e3d2e22d56c57afda403c40dd5fd7b3
SHA11543d135058a2c4628d8f506197751403cba5cea
SHA256de22a36726c4f41a850318804310619dfe09ca6fd43ddfe4d2bfd3e50c33ecab
SHA51240acd89c28b75f1741280c4f3fcb1781a637278916cab00338ef03755c041465f576db2a8de0134797f37e9501251f45e1ed4e618817f8ad649fe6d78cfaa36e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD50fac88c49404a2becc94fac7c10f53d3
SHA17982112b10a9f1f4230332fc46ab81a7debb8526
SHA25653e0e4368e8c0262f12d0bf73a63e260c2b5357e99e4fdec5b5cb4ef1cb3b747
SHA512da993328fea8379c3a96df52051cd9ae3c6daaf37a5595d951f12ac1cb985613f6787e00d8abe9563edf6a8b65fd39f9e5153a5db9886ce50bf888cd70852656
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD526f59aa01baccea9021e46af186e49d4
SHA1dafc6b7ade31f6834a40ac0222327f7dd7eb24cc
SHA256dd2cd1991017dd4ebe0ddac80017bbac8d6286a4c421612ebbcfd353df169a1a
SHA512d0df371167c0ad615c5baac414166873090d749a5587b738900a21da6d42153af0625d3f9f66a77162d0affe8b2f62a64fb621e906a36e408c6b1dc6bc4e8dbb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5022c3d184e566d56ca9b78ff2a6acb6a
SHA10f1d5b07ab919a542065f61cf312a037b8a336b3
SHA256840a95176e0574b350d1836967c6f7b9ef28da7d0d420d4b7b8c228726ab398d
SHA51233e6d26fb8a126c16aba34f912b20389b7bf35a196774adc86dfb68118c59c96408c0a8b54f4d26cc09df0374f3a63ccb74f8a6f4b67a1d700009a5486afa826
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c41ff1c77983047bb537562f6b40bb73
SHA157edf9af801a648ce0ac41e0b642c4c57e315541
SHA256bdb5057bea95b62a8fcaa5adcf9fe5e06589a6854bd6c62686ced93215dd3fbe
SHA512765b3ad75e659905bff315948cbe744896a22ccb1f2dd719b64a13ceeb6ab308655e9b8ea3003c2952f9aaf2bf74f3c9770cd253c14fd208be002d2f9aefcafb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d3b7d8ef28780a695125052b8a12af62
SHA1eab899045bcfbe024bd0e9124b0c258cc524a76c
SHA256a255a8b676f274f02e5ce71ce80129b917f186c3373bbd7bbbf07d672fee02cb
SHA51237b9ac7534da98ba827bd79c92f5c2892fcb311727f3b89d7fa014c078c8b62977ca3b3108730e3d5185659101420907a8d5db75e777a2de82133bb558d4ce10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD550558cbfcf6b565ee5963e48e7dfb461
SHA1eaea6d5622bcb27e6faa6c78feecad328463b7c0
SHA256242e6a673e3af74bdc3e370fabf1ecbe323e6893b6da50de090e422d758dc622
SHA512ce0fa5572290cb9a060f92ed183992bd5a206da059ad5a7c86fd9795c878758442ab531fa6808362dcabc6b5a4d4b5d7ca624035da1194405ae7d75c5724a7f7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5083daffa9ec1ef935be710e5212719ad
SHA18947ae791d442e0d1799ce46892fb2837069345f
SHA256e950f078143d79ffefb0c3351075fceb13aca790d9145659372bde073750edd2
SHA5126fb375ad14413662249962faf99a9ebb1de47284d848fcd03f193774690c767b06ef90668d4707e4ffd1ccd16f4d8f7cabaf7c6dee4bb6b34b2e44c550c9972a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD57c3f433e1f0c80e12641db98204ac5c1
SHA176438cb5b8b1f1cb3fd81f82b1dc1e5a1549378d
SHA2563757ee3cd9084d55bcb1e0d8f28111a23cdf79a6d1613dbaa3b3be7793b36196
SHA5127967cfa4b8b075547b78a09c46cabae801f896adf0ee5b568ebbabc1aa25e6f7cbfd074a3c6ea2141fd9d315e515b6c9d9cedb2d93a37848ca8cf23ce7ec18ef
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD55ac09959eeade45925500a7e3c2018f3
SHA16fcee64fd3e12017d04b0f5c82883250b296fe5c
SHA25675f4a50ea2d5558569fa637455fa5778414e1db335e8285a6185d4b102501ce9
SHA512cc3f3bb99eb45a148d114da522462fe43c8c0235816bf4b77055fbded1cfcfb503b1dd6fdc44ce69eb77ee5d82351c114add54980cde9504ba0ee11168266278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD555102f4c22aee58312d7f27b32b9093a
SHA1b6469bedd91029a2befada6d2b14c13ee8b83f7a
SHA25685e7670c74fc36f22fb94779e8f559dec6732fb6b8b3a2daa9d331bd23ce741d
SHA512ca8922a89c83a52b63dda88112de0b3bb46389da11d3c1e18a9b6acc77c3d9319035da4fa32efd2fbe967e8f9aa1c3398f2d7103069e0f69b20181ef1c074583
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD56e83d5f354b045e8a5ea191437715459
SHA17c74b89141af14f4c6955cb43d5945e9213f140e
SHA256a25b4822c24342d02b2c52ef328bd23d65075a679855057bc5f6b5f1b16b8a36
SHA5125cbf612cda46ebdcaecf174066640d28e16dd744f0e1d849572492f5900ddfda3348b690a93b6d732cecd400d1d00632cb0a2b92f0283d80b316d5ea8e7b000f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a547d20bdd36036e4687f54d2697c4b2
SHA1f2052f19710a0bf0252aae96b56387dd1db0c324
SHA2561552b1fe53c387beb6391def878787df89a76203d858c243fede52a16dbdc7af
SHA512770d06416c2924e7e3321de5fd9e4f9729e4ff1ed7db0334c8b279662388860cfd592859d43ee1b0a892307bd6a042ec6c9bf64938f0fbf402bd4f02b557932d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d48221af4d3bb29c723d50909faf4660
SHA15dadbffbc0b05602e914550bd292917d6ebef1dc
SHA2565977f5e3d3b0ae8ef0461d908d3b83be2bfe3ddb5292f761e861a4f94b6ca2a0
SHA51200b9694e8e3dba687386124cbe958897380c637605ffbd7eb69fafe56694a739062763f4f8d171bb7a3daef487ab99a1985fbdaffe48f2619f6e6522126c0037
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
242B
MD5392affad8059b2d4f89a505329df047b
SHA1f9fadad0166947db2e351d3e06c62fb02add54c2
SHA256ca06d4b8eae9fcec53e07209af1fa6b74ed1cc2f9d98d43155160028bcf2dc9f
SHA5124bb8d5c3b1f3c9eebf265f8c47c2096992dc9cff306d6e14c0074ed293346cf1233120417046164de21af5ce494b06cbe51192210f660cd8fd1e4ba33e5346c0
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\3pl5scb\imagestore.datFilesize
1KB
MD5f50bdcea3c195af5db8b0403269d4766
SHA14065431265af06dd12c5f22b2b9f7ff064b463a9
SHA256a1cb3a919b607b59ca5afdcf92001848b812163bf5563b562eb5b2825bc73942
SHA5123c789fb6721fd56242cb1887d90fe61039c0a3ed3620715b4bec581f241009e6a9a5210adc135e8c84fb1aeb258c0a92d7ed4acf45c7724658fa56a3db6ff23d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OORQXHVT\favicon[1].icoFilesize
1KB
MD59666d7d69681361c8f1ee6e1352b37a1
SHA1026d01b3e9a1c8752be75f348484713f64099551
SHA2562a40e46debd9a2139f8d6bfd02b2fb15039373d67965a352c9a2c9cbe45257b0
SHA512ca6ce9f0c7cec6a409d0a5ac05df757e90fd8812c6df12fbb09144d00bca10ab3a091120f0b10de584d966e5eafba14ca8823103c594b868dce0858c9ab6d9f8
-
C:\Users\Admin\AppData\Local\Temp\Cab5331.tmpFilesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\Local\Temp\HD_1e820ed6dccf8ec6694a9113c9c173cc3a347b5c5e34c093c104da0f82f47afb.exeFilesize
2.0MB
MD55ffea70baa8dff06141e3145fbf160a0
SHA1edc2213a63797297f466cdcc4a3862fc2392d649
SHA256c506e1eddacc729428a61f021faae0287471545fb32b5deb5e1d1e7f6f1f576a
SHA5125477a446ea59b56e488433fe0ee433d09d0d46b902842f4dea89d42f8e1f07c3d08737b1248aa0e3dc65f4c1700006d779ba0c79f46ade911999969b84745f52
-
C:\Users\Admin\AppData\Local\Temp\HD_X.datFilesize
2.4MB
MD5b509294fb0703bc2e35e7b20f07de7fc
SHA174b76864f3f045ed1e2742cab5d5a0aca9bb55d5
SHA256b10e20c356c254af8151a48c1d2878a227f22c5ee5d851189971215bc269fe9d
SHA5122636997a929f16cba52b0e5ee58a58d5784c4eaff8570cdf468398864fb17ab3960370c3ea540a07b876b2fcbe423d8877a0862c7a374788d5911798d86811ec
-
C:\Users\Admin\AppData\Local\Temp\Tar5460.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
\Users\Admin\AppData\Local\Temp\N.exeFilesize
377KB
MD54a36a48e58829c22381572b2040b6fe0
SHA1f09d30e44ff7e3f20a5de307720f3ad148c6143b
SHA2563de6c02f52a661b8f934f59541d0cf297bb489eb2155e346b63c7338e09aeaf8
SHA5125d0ea398792f6b9eb3f188813c50b7f43929183b5733d2b595b2fd1c78722764fd15f62db1086b5c7edfb157661a6dcd544ddd80907ee7699dddbca1ef4022d0
-
\Users\Admin\AppData\Local\Temp\R.exeFilesize
941KB
MD58dc3adf1c490211971c1e2325f1424d2
SHA14eec4a4e7cb97c5efa6c72e0731cd090c0c4adc5
SHA256bc29f2022ab3b812e50c8681ff196f090c038b5ab51e37daffac4469a8c2eb2c
SHA512ae92ea20b359849dcdba4808119b154e3af5ef3687ee09de1797610fe8c4d3eb9065b068074d35adddb4b225d17c619baff3944cb137ad196bcef7a6507f920d
-
\Windows\SysWOW64\259403423.txtFilesize
899KB
MD57ed6705a438d63b94fd34ac929379d93
SHA1cd326d94e67699b650a536d4614b5c4b9fe7ee32
SHA256fc53dd70cfa25e4b00009198f2555c3d609368d9b965e491cb3bf7166650cb4b
SHA51296a8817369ada0dcd201d4728bc1606c6d984da2ddc817cf1f9970fefd4384c1934edd52670bcb77775163f4e1e7c8244d879a6aeb702f23cf8115983aaea90a
-
\Windows\SysWOW64\Remote Data.exeFilesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
memory/2460-49-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/2460-43-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/2460-46-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/2556-18-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/2556-21-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB
-
memory/2556-20-0x0000000010000000-0x00000000101B6000-memory.dmpFilesize
1.7MB