Overview
overview
10Static
static
10Release/Guna.UI2.dll
windows10-2004-x64
1Release/Mo...il.dll
windows10-2004-x64
10Release/Mono.Nat.dll
windows10-2004-x64
1Release/Octokit.dll
windows10-2004-x64
1Release/SeroXen.exe
windows10-2004-x64
1Release/Si...UI.dll
windows10-2004-x64
1Release/Ve...ib.dll
windows10-2004-x64
1Release/client.exe
windows10-2004-x64
10Analysis
-
max time kernel
297s -
max time network
278s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-06-2024 15:32
Behavioral task
behavioral1
Sample
Release/Guna.UI2.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
Release/Mono.Cecil.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Release/Mono.Nat.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
Release/Octokit.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Release/SeroXen.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
Release/Siticone.Desktop.UI.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
Release/Vestris.ResourceLib.dll
Resource
win10v2004-20240426-en
General
-
Target
Release/client.exe
-
Size
292KB
-
MD5
c5cb7f04d3461efa49da4ba79b0295f3
-
SHA1
82441798da42d6b8138ba2e0488aa981886c5248
-
SHA256
b158f718405a2df94ad3aac1b4d695ed2e990d90d4537fc621c8a31d19a6052b
-
SHA512
91c7376c047a2d8e8da1069f708cb8b45b9624993a6a4cb80e28b91ab1180df965c49bc180915a9facd8c45f7170cb674f158c6bba66fbe247bb68572ecea5a8
-
SSDEEP
6144:BTjJFBhD3ackfL0a576r3dwO4LAkbDFfrAaYoutpz:BhJ6wr3d34MaYzV
Malware Config
Extracted
quasar
-
reconnect_delay
5000
Signatures
-
Quasar payload 1 IoCs
Processes:
resource yara_rule behavioral8/memory/2904-1-0x0000000000A70000-0x0000000000AC0000-memory.dmp family_quasar -
Checks computer location settings 2 TTPs 30 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
client.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.execlient.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 30 IoCs
Processes:
PING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEPING.EXEpid process 2712 PING.EXE 1376 PING.EXE 1752 PING.EXE 1028 PING.EXE 5032 PING.EXE 2244 PING.EXE 3692 PING.EXE 3540 PING.EXE 4040 PING.EXE 1732 PING.EXE 2656 PING.EXE 4956 PING.EXE 4408 PING.EXE 4828 PING.EXE 4748 PING.EXE 3848 PING.EXE 3992 PING.EXE 4184 PING.EXE 1368 PING.EXE 2868 PING.EXE 5060 PING.EXE 4756 PING.EXE 1008 PING.EXE 684 PING.EXE 3520 PING.EXE 2608 PING.EXE 5048 PING.EXE 548 PING.EXE 456 PING.EXE 3092 PING.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
client.execmd.execlient.execmd.execlient.execmd.execlient.execmd.execlient.execmd.execlient.execmd.exedescription pid process target process PID 2904 wrote to memory of 3156 2904 client.exe cmd.exe PID 2904 wrote to memory of 3156 2904 client.exe cmd.exe PID 2904 wrote to memory of 3156 2904 client.exe cmd.exe PID 3156 wrote to memory of 2196 3156 cmd.exe chcp.com PID 3156 wrote to memory of 2196 3156 cmd.exe chcp.com PID 3156 wrote to memory of 2196 3156 cmd.exe chcp.com PID 3156 wrote to memory of 1376 3156 cmd.exe PING.EXE PID 3156 wrote to memory of 1376 3156 cmd.exe PING.EXE PID 3156 wrote to memory of 1376 3156 cmd.exe PING.EXE PID 3156 wrote to memory of 1828 3156 cmd.exe client.exe PID 3156 wrote to memory of 1828 3156 cmd.exe client.exe PID 3156 wrote to memory of 1828 3156 cmd.exe client.exe PID 1828 wrote to memory of 4112 1828 client.exe cmd.exe PID 1828 wrote to memory of 4112 1828 client.exe cmd.exe PID 1828 wrote to memory of 4112 1828 client.exe cmd.exe PID 4112 wrote to memory of 2668 4112 cmd.exe chcp.com PID 4112 wrote to memory of 2668 4112 cmd.exe chcp.com PID 4112 wrote to memory of 2668 4112 cmd.exe chcp.com PID 4112 wrote to memory of 4408 4112 cmd.exe PING.EXE PID 4112 wrote to memory of 4408 4112 cmd.exe PING.EXE PID 4112 wrote to memory of 4408 4112 cmd.exe PING.EXE PID 4112 wrote to memory of 2456 4112 cmd.exe client.exe PID 4112 wrote to memory of 2456 4112 cmd.exe client.exe PID 4112 wrote to memory of 2456 4112 cmd.exe client.exe PID 2456 wrote to memory of 5024 2456 client.exe cmd.exe PID 2456 wrote to memory of 5024 2456 client.exe cmd.exe PID 2456 wrote to memory of 5024 2456 client.exe cmd.exe PID 5024 wrote to memory of 1252 5024 cmd.exe chcp.com PID 5024 wrote to memory of 1252 5024 cmd.exe chcp.com PID 5024 wrote to memory of 1252 5024 cmd.exe chcp.com PID 5024 wrote to memory of 1368 5024 cmd.exe PING.EXE PID 5024 wrote to memory of 1368 5024 cmd.exe PING.EXE PID 5024 wrote to memory of 1368 5024 cmd.exe PING.EXE PID 5024 wrote to memory of 432 5024 cmd.exe client.exe PID 5024 wrote to memory of 432 5024 cmd.exe client.exe PID 5024 wrote to memory of 432 5024 cmd.exe client.exe PID 432 wrote to memory of 4288 432 client.exe cmd.exe PID 432 wrote to memory of 4288 432 client.exe cmd.exe PID 432 wrote to memory of 4288 432 client.exe cmd.exe PID 4288 wrote to memory of 4312 4288 cmd.exe chcp.com PID 4288 wrote to memory of 4312 4288 cmd.exe chcp.com PID 4288 wrote to memory of 4312 4288 cmd.exe chcp.com PID 4288 wrote to memory of 3540 4288 cmd.exe PING.EXE PID 4288 wrote to memory of 3540 4288 cmd.exe PING.EXE PID 4288 wrote to memory of 3540 4288 cmd.exe PING.EXE PID 4288 wrote to memory of 1360 4288 cmd.exe client.exe PID 4288 wrote to memory of 1360 4288 cmd.exe client.exe PID 4288 wrote to memory of 1360 4288 cmd.exe client.exe PID 1360 wrote to memory of 3632 1360 client.exe cmd.exe PID 1360 wrote to memory of 3632 1360 client.exe cmd.exe PID 1360 wrote to memory of 3632 1360 client.exe cmd.exe PID 3632 wrote to memory of 808 3632 cmd.exe chcp.com PID 3632 wrote to memory of 808 3632 cmd.exe chcp.com PID 3632 wrote to memory of 808 3632 cmd.exe chcp.com PID 3632 wrote to memory of 2868 3632 cmd.exe PING.EXE PID 3632 wrote to memory of 2868 3632 cmd.exe PING.EXE PID 3632 wrote to memory of 2868 3632 cmd.exe PING.EXE PID 3632 wrote to memory of 4316 3632 cmd.exe client.exe PID 3632 wrote to memory of 4316 3632 cmd.exe client.exe PID 3632 wrote to memory of 4316 3632 cmd.exe client.exe PID 4316 wrote to memory of 3376 4316 client.exe cmd.exe PID 4316 wrote to memory of 3376 4316 client.exe cmd.exe PID 4316 wrote to memory of 3376 4316 client.exe cmd.exe PID 3376 wrote to memory of 2372 3376 cmd.exe chcp.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vvuEVlgmmIrt.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650013⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hVe4YvHBGHcy.bat" "4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650015⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost5⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"5⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wEc5GYeY1pmi.bat" "6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650017⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost7⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"7⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rn3cmlO8dLyw.bat" "8⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 650019⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost9⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"9⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3x8JrznfI2aB.bat" "10⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500111⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost11⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"11⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\VFgMi3F3IzjW.bat" "12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 6500113⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost13⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"13⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\46vT0Hpcva7G.bat" "14⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500115⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost15⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"15⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jYtdjdVKBrlN.bat" "16⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500117⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost17⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"17⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\S1eYFkMMxv7O.bat" "18⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500119⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost19⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"19⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2N4TJ9YzHVP3.bat" "20⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500121⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost21⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"21⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\lqpNqGP13Zk4.bat" "22⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500123⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost23⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"23⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4ab8LevhLwbh.bat" "24⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500125⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost25⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"25⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GlgpPsKEzeDw.bat" "26⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500127⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost27⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"27⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\X0Im93Fqa3Be.bat" "28⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500129⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost29⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"29⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ohK1mEQlRWOi.bat" "30⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500131⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost31⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"31⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\I2caWVDvsMCd.bat" "32⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500133⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost33⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"33⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Cb362hyVTrNr.bat" "34⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500135⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost35⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"35⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xYypK0Qbwucn.bat" "36⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500137⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost37⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"37⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Lpi8OKjgR24F.bat" "38⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500139⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost39⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"39⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\c4L58VdI1R2x.bat" "40⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500141⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost41⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"41⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jjREenGQTN3N.bat" "42⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500143⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost43⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"43⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IbhKw1qz6zS7.bat" "44⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500145⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost45⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"45⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zXoKRZ9m3Dz9.bat" "46⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500147⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost47⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"47⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ezlVAwqUJTeH.bat" "48⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500149⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost49⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"49⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9pDsgPFjQHL6.bat" "50⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500151⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost51⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"51⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GUJ1BhsrsDMX.bat" "52⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500153⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost53⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"53⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ZE5mh4PYAaEA.bat" "54⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500155⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost55⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"55⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2aNKRLCiaQ25.bat" "56⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500157⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost57⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"57⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\h1LVAitQqggC.bat" "58⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500159⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost59⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\Release\client.exe"C:\Users\Admin\AppData\Local\Temp\Release\client.exe"59⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\e5vqS6F599lL.bat" "60⤵
-
C:\Windows\SysWOW64\chcp.comchcp 6500161⤵
-
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost61⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\client.exe.logFilesize
609B
MD5f78129c2d7c98a4397fa4931b11feef4
SHA1ea26f38d12515741651ff161ea8393d5fa41a5bd
SHA25629830390784d06271342237443b6224bb98be0539e34b64e7344c78d7cdd93d9
SHA512cbca1d486c2bd7655752930b9020ccf3f8ae67a67dcb2cca51c31763a51fea8fb951d617c31a3746680303a8c6d45361c120f15ef06c30b417202949728b5b35
-
C:\Users\Admin\AppData\Local\Temp\2N4TJ9YzHVP3.batFilesize
211B
MD5f988147afdcf6bee8cbe13a5dce34673
SHA148b2cfbb6117ac4c04fcc022faa0c4fb3591ca71
SHA25601b26c81ede7b01ed903c7b7d5700f0543906a481908519cc781d6add7bfdb60
SHA5124effa0844accc59b4e19475d6ed929d9a84d4c62d4faf380c1794d9e1a7c10b3a3795dcfb295fac999d68d44a7dd58140b7a6513792f4606af441a0a36d79089
-
C:\Users\Admin\AppData\Local\Temp\2aNKRLCiaQ25.batFilesize
211B
MD599a035b6f2c747b7d06e399ba5d1d3d8
SHA10dbf7ce9e37d5b2ca6cca77c3381e146747afb1c
SHA256dab6af78e2f4107b17b99d437e84778f86ba636fbd3e908196fa8f3ef7e35ae4
SHA512c6bd7bb91e4de5cfb4cb71603ee38c6cbf5fb7bebd1959c404a33aaed850871a4ae8dc17ff1ebe0ebb310bae1ed1ecafadfa3a0c36b87c4f0a989f21b527facf
-
C:\Users\Admin\AppData\Local\Temp\3x8JrznfI2aB.batFilesize
211B
MD5994e28a388f93b56da5ff0dd6365b69d
SHA151ba8b8c9a4db46a173a145493e02f86f46d0cea
SHA25670d3826fcd2f33badeaf276091e587f39e14f361280d9ee34cef987eaa6354eb
SHA512f357504216fa2da8e4f391ba694a3e764bc692736b7684bceb53e1b0136eda55984b27591101c1e4b8143e9779f7a76433f8ce1578fbaee0d85974cd4a639d27
-
C:\Users\Admin\AppData\Local\Temp\46vT0Hpcva7G.batFilesize
211B
MD5f6c7e4ebb811f6b4d27293df1c04319e
SHA10ba48aac50f1cf6b003d49678475e239c2892654
SHA256cde3e7835aeb25ef7defa720875484f6e8fd6fda4245112833901c64fb769b64
SHA512d1de10b7b39d5fdc30bca93f1d0b7eea2edde039e504a907ab7edb9ad402399b5f1b8b0b7fca8d15adf8ced56a402a2cc01c3c1b22143e5e0c1a85d7f4aa1ff1
-
C:\Users\Admin\AppData\Local\Temp\4ab8LevhLwbh.batFilesize
211B
MD58aecf2eb1a8984bd772a3b56b5a3ab9a
SHA1b516e55674a6afd9dda95b4013ce5265c9672f3a
SHA256fda6c4283cde3b64485f49e75ba900676fe8444fc519d5d5d84fc4512a72ed1b
SHA51230f8436af63d1b52d537e08fed6a87e9e95b291c8ccc65d0b8586c66e0a3c440cdf90e0e8d411994485131f561b63ff2e940956cadcb8dd6b8d22d63f9dc2eea
-
C:\Users\Admin\AppData\Local\Temp\9pDsgPFjQHL6.batFilesize
211B
MD518be8f64d7ac33881ac477badbcee671
SHA19837b4a87fae3de5122bad5905940ec07b1c1442
SHA2566c328e43562eb7d21ad8f89f6443f89c8a08175485d20e140f46a648af998c24
SHA51264b475b429da11fcb7a0d61b973cabcc0bdc61bd8b90b0d9bccd0597175aae1b4fb922c22f2421f64066b2fe0871a37b84c34908178531e4e04809beffb27869
-
C:\Users\Admin\AppData\Local\Temp\Cb362hyVTrNr.batFilesize
211B
MD55c9b0cdd9e77063da547aa4e562264c3
SHA1e8d2cfa88f99a0fc0cde9285672991cf327dde3f
SHA25665617a480d378eefb1c7b02e830d601d08ec481226cba071ac66079937011833
SHA5123236cc8b03cea72ed25a0113cf3e215c63deee28435f32215eef534b34d8baa8c28429b1c7625711d4bc5bd776765beb3229689afea4f382b946384fe4b51a81
-
C:\Users\Admin\AppData\Local\Temp\GUJ1BhsrsDMX.batFilesize
211B
MD5aaa181922fd84b9977a59788d38068c9
SHA1cf3694615ef7919d04ab2d5a6c2eb2f0b0c0af01
SHA256396868e6616e29e44d656492fe373d8ffbcb20282a59eacddbd87397b23a82f3
SHA512f892ca18e084d36b4784cebc5cfc602c0a6e6f03626262c92545390aa425bf2dd620cd93aa4e36632b66a022f8767dd74e5566c2437e1a842817da64a40d9674
-
C:\Users\Admin\AppData\Local\Temp\GlgpPsKEzeDw.batFilesize
211B
MD53ea87908685a71bd59e801b047652d50
SHA14d79f578fb5fb7e4f8ad6234bd945588957c9eea
SHA2568911a03cd95f497b27e7f22601e3882864d007a52c197f3d1423310b51ca70f2
SHA51208e11b9c47fb753df101af9f0cf9c851d1d5ca8bb91b6aa9a8d585d3c7d80120eeaf40b66c16ad49c2d966da3457d1a008b71a0325dfb7cbe17d0324a83656e2
-
C:\Users\Admin\AppData\Local\Temp\I2caWVDvsMCd.batFilesize
211B
MD5d1bafe9cdc31dbd79002c11a4b348001
SHA19742fecfd798c280a729107925fc697647574605
SHA25692d074b8961b3a5c071279942c009fc7af552925cff6dc2926bbd7a81a30313c
SHA5120ed9fab705912a6ec5642b5cbb09ff80ae9ce5003debf69ade643859ceea1ebc1b29f757ba30cac5bd579a2dd6c1065b573769a5d7afd3c94003a35e880b3ea7
-
C:\Users\Admin\AppData\Local\Temp\IbhKw1qz6zS7.batFilesize
211B
MD5c5467943dec93b379db2d13db849590e
SHA1bfd04c06d1341087eae95166f194c70972013f96
SHA256fd15e00ba41eb220a53f5cee422bcfd4793c81a3ed237ec4131049223eca5672
SHA512fcd44f32372ab07c2000725cd2d3244e8c69dc69e2014b9fadc4c85c2729081d51beab6cbe529a6775e9962d07dcf5bee5f4201bc98fede0e8fb2baf1b363d52
-
C:\Users\Admin\AppData\Local\Temp\Lpi8OKjgR24F.batFilesize
211B
MD53eaf6de29422833dbea956847383f92a
SHA1fe51ead008384a7c7b6667e720914d81b223336f
SHA256ec4bcb449de550364a61af2d742acde56efd860b205f0f21e07c1878948761a7
SHA5121e65fb501f990a82cd576a7b29229bd0d013336e341edc38ba479e5b2619ffa72142ed737bb35926fb7c605e37cb9dc286b6e12e32995a47ed66593c23b43bb0
-
C:\Users\Admin\AppData\Local\Temp\S1eYFkMMxv7O.batFilesize
211B
MD53fbba1a433eaba5608ba76a6c9ce6b81
SHA1261b93956a53c39eb9327b1bdf0a991fbf71029b
SHA256c41ace8a182877f99b9e662769904a3f43108ad28ab59e09beabb60d500825e5
SHA512a3860bd08c45b597a4afe03ae06cf150631802f2d0f34fbddf988bb741ee5e36050d319e5b8265ccde16397c68f21e100b4881a8cad2e26d6153b91ab08c8f18
-
C:\Users\Admin\AppData\Local\Temp\VFgMi3F3IzjW.batFilesize
211B
MD5385d19e94dc27d188d40598bf5ba1cbe
SHA17710d4f6c915ba28128203681958d0d13ba2b001
SHA25641f699c0f7a31744047d00b26844c06bd020d88852bf5b82df1d991d0a785263
SHA5124ff38a40c81558ef9dbe687dd665ea6ed2c17f091c2a919ae092f2604b9f3f6970816575b5f615ab0a1406391befe4b14be634e843c7aa27656943bf548d62d8
-
C:\Users\Admin\AppData\Local\Temp\X0Im93Fqa3Be.batFilesize
211B
MD56908994bdabc199ba7f820fd674e60cb
SHA13d959195c0d81e8fb7bcbcb31668cfd3e8ddfe5e
SHA256d8b43157496b433093b09ed4cddecc15a7d0c151f92933907b7287adbc306200
SHA512b981d75a0f56919be6bb8d725921bf663b4df6ddf71f8aeddc231f54c876ce0d6ce910a642e81ad1dc159e6e2e7e813d2d0c49167e8c178ba1c98a5e84dcbf9d
-
C:\Users\Admin\AppData\Local\Temp\ZE5mh4PYAaEA.batFilesize
211B
MD5ad002b9c3b14e56c268af1f44ceb6ca2
SHA19132e39003157bfe65ebfd57ddf41e4251271942
SHA256207d5c55e55fde69ceb7b10e75dc71a63107507f71617e09456514c7d775d22e
SHA51236619d2cb0b50eb3ecf5dc6b95211e3427543a8a8cc99405df0511dd470b6c50d816ac1b6dec6ef1de9c650dc976726881abb838052b99500ca99f22dca97664
-
C:\Users\Admin\AppData\Local\Temp\c4L58VdI1R2x.batFilesize
211B
MD569b9c9bc385279a5f703d4636415f0b8
SHA1e171b18c090e6af5c2c9ab0a5c01934231bcef9f
SHA256617bcac209fd31ef081976b35b236376849947089281d8fd2e032db53c7a900d
SHA512e0d0a31ee7bc100533b4ca41940dfe37f61d19ec9813528c2c885338228a95c65cd2972fd39c5023a75d361f36f84edd9047d017d2bdeedf3fd946e5c37e29a2
-
C:\Users\Admin\AppData\Local\Temp\e5vqS6F599lL.batFilesize
211B
MD51b60d7b935f2edb8a6409951c10db250
SHA1957acc0c358280ae5da87f244707741e314828c9
SHA2563cd51ce9ec58b6285a275ba18e377ccaacd4b68c83803d18c74ad37a23d29eb6
SHA5123f17109d0d6a02014c946afdc7a60584570da65aa56489f83071251b191ba60cf5601677bf398c6dc118b189fc8e506525124970573427ab9adbccb2d10f46b1
-
C:\Users\Admin\AppData\Local\Temp\ezlVAwqUJTeH.batFilesize
211B
MD50e6140d222e7c92df7815e8388c5b7cd
SHA163a0fdde1af0808b85d87d049e1ff23f666cb85b
SHA25604fd3a70b4b6b3f17a28ccf06027361931fc09e20a1a8bc7343abd653bdb8e99
SHA512ac01d5391d8eaf39521a0a9b31085dade8306e89de19c604fd6a9e474a170ccbfaae93211d076e7c9a356be8ceb2e6dd2b33049edb4cb89c24ca280ed1b84c12
-
C:\Users\Admin\AppData\Local\Temp\h1LVAitQqggC.batFilesize
211B
MD58bb5f549a8b0f0e5783ad83a70c99ce5
SHA1916f55ecf66669fd14980718f13b5a8eb643c2bc
SHA2562d711b7f147b1ad417f1cee0bd2ca75eeee76cba6a46b596d0278626a6543eb2
SHA51280bf9acd41f31872643479ef7c50926d39692305223e3196c54da2ee0de8abca4894efb4f886b23006015a5e801b46f5412cb9b60e02b7b15298b306067bdb2b
-
C:\Users\Admin\AppData\Local\Temp\hVe4YvHBGHcy.batFilesize
211B
MD54829d6de01d3f3ded14b1b636a9f589c
SHA140edd678355dd723937759881348e20bb380400a
SHA256590cbe57fafe259d13d867cb5f320f8d7fba0a19d1314ccd5559219396d0b29c
SHA512a86e57b16cd238db5463466cd07185eae1c31c3f14be7fb3bd52756f203804484350b23feaee5d9690723c71f42e57be31cc1d80c77a83a8b7ce0c88e24432a0
-
C:\Users\Admin\AppData\Local\Temp\jYtdjdVKBrlN.batFilesize
211B
MD54a7f552cb3f1f39ac3f82495cc020a53
SHA1538eaee7368799a8078893ddb582dbbf95299478
SHA25666079e5bd5977d80c04d3dda022904ef2fab9bb00dbfa8724ad12a7a936bf276
SHA5120f6f2f28e491e88228be584ea8d85c850da98178497437a3271e821a07dcb1d947ddb870e7e281e227b4d38bf15f3637aacd086456ee839b959122930745a27c
-
C:\Users\Admin\AppData\Local\Temp\jjREenGQTN3N.batFilesize
211B
MD5c4f568b2d7287b7bf05b2c4acc83d51b
SHA156affdca5abe898095420456748eb8701c5e67f0
SHA256c3fe5e59650cf33bfa91be5788b316b75740507d419f8dbcf143ce69ffa8166f
SHA51274549ff28fa5e4e44a1439bca3547b9f46abd7bb7488841d0839d4998c08cedeaf1ba8aa817e946ba3c1707255ea3d1ad76a876212c222174a1c52e81cbee2c1
-
C:\Users\Admin\AppData\Local\Temp\lqpNqGP13Zk4.batFilesize
211B
MD552733be06fb6a22cfb332530e37e3e01
SHA12d836d884e0c70f0c9425c754ad00abe46ef640e
SHA2564a10aa35d4aaf267048f7c828e5650c26aab424a0ad11a1b5d8fb247fcafd0f4
SHA512c00dbe08531084beb60ca9882ad363ce90e564327fbb05757a258779a7fc07d4f6e15f935e46b0b2a1f3d1138562c295ae54aed04dc2ce45e5ef46d33290bfbe
-
C:\Users\Admin\AppData\Local\Temp\ohK1mEQlRWOi.batFilesize
211B
MD53f3f7207b447b82fa8c14f909dafe82a
SHA1ecd0e2fdd34edb49b87d28818884b2c790809aa0
SHA25654621e0b172fadf27974d04649700baf86391fe6cafb74f5884de522b320ddc2
SHA5124fd8bb28875e0a892a8925d4ac56105de2d6e1803532bb8698ec3367e5432e5096111a8e94034fd68f5b9991eaeb9c843479ab5e23383ec415e4eb78c1df77f4
-
C:\Users\Admin\AppData\Local\Temp\rn3cmlO8dLyw.batFilesize
211B
MD52e517f08c9e686902c740380b6da5917
SHA17fa4a6ba965e08022446853a7a26814f273bb1dd
SHA256ff0e2afe04cf4a26b88d2e615578ffa3cbbd05b599d2c609eae9514c556e852a
SHA5126b86ac71308f772e620049905cf52a04ba5e6139c60ecc7a6b87927824e74a3c1e059e9f02727a7cca948614c968d0c3073f165f93928c823911a07045b5af41
-
C:\Users\Admin\AppData\Local\Temp\vvuEVlgmmIrt.batFilesize
211B
MD5b1673d80f7fc08d743c3c9d829278af9
SHA163abd92e25d59d6ea581085c9a8756b04a6bfa0d
SHA2563cc04a6a99b02e4b16b6e920751921c29419e60935948be91af88c873901008c
SHA51274d8ec17f0c033248832b6a2432ac9d0bc666169f321e5cb7ddd11e128c83fd612756accbdc5801890d3e0836b966e7fcb80767b6dfab33da8c72890b8e61c7f
-
C:\Users\Admin\AppData\Local\Temp\wEc5GYeY1pmi.batFilesize
211B
MD5b5e746f2fe493d5b0aa6f949e2ef9270
SHA10dead00a5cf09e71990fcedcfea94b206884a304
SHA2565e544524ede6c02359367879dda02643cda2e9e0b32e76486fc527f550f748b1
SHA512337889fe81d162adfefab08ae99e67a6b6e79a61293cb1d62e6ab828bac74ab0304db6fe704d7d1caf991c82ffec618bf357d34d86aae5a61c0ad16bd7d28eac
-
C:\Users\Admin\AppData\Local\Temp\xYypK0Qbwucn.batFilesize
211B
MD5f3c29e2123475ef9183618fd68b4e596
SHA1343f18d7bf9b028af63b4be7817b69dfbb0a7bcf
SHA2567bb152cfdb638e0e39c70ef504215b0cc7691e270f74e623d52481092ff051a3
SHA512f8a35c09ffcd70c09a140c5cd83878955226f95430db3885a4428fe61d104641fb065af22acc8217faf4bf2bd4cb27c879c209d5bbdf59a4e49ab45973d7195a
-
C:\Users\Admin\AppData\Local\Temp\zXoKRZ9m3Dz9.batFilesize
211B
MD5aa17b7bfcd93536a3c2eec0775756fe1
SHA181cc0ed6a12f8df4c33d294ba3514cea5c021de7
SHA256f9ff3238d684a0f1205e86b3cb7326a7e8cb73fd69004bd8b31d92e6ba7de0f9
SHA512e2f252fe47849f9735de3c6bf638812b8e21e5a0c982244dc38524e66019adc1c68970d8beee991f6816a071ca8fc6115c00ba1a6c5278e9d7686cb64da1c10b
-
memory/1828-17-0x0000000075110000-0x00000000758C0000-memory.dmpFilesize
7.7MB
-
memory/1828-13-0x0000000075110000-0x00000000758C0000-memory.dmpFilesize
7.7MB
-
memory/1828-12-0x0000000075110000-0x00000000758C0000-memory.dmpFilesize
7.7MB
-
memory/2904-0-0x00000000751CE000-0x00000000751CF000-memory.dmpFilesize
4KB
-
memory/2904-9-0x00000000751C0000-0x0000000075970000-memory.dmpFilesize
7.7MB
-
memory/2904-4-0x00000000751C0000-0x0000000075970000-memory.dmpFilesize
7.7MB
-
memory/2904-3-0x00000000054F0000-0x0000000005582000-memory.dmpFilesize
584KB
-
memory/2904-2-0x0000000005AA0000-0x0000000006044000-memory.dmpFilesize
5.6MB
-
memory/2904-1-0x0000000000A70000-0x0000000000AC0000-memory.dmpFilesize
320KB