Analysis
-
max time kernel
159s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
19-02-2022 09:06
Static task
static1
Behavioral task
behavioral1
Sample
af4bb34b486434d235ff70d344e3fa4e6d56a83705e1cc288efe219edceded06.vbs
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
af4bb34b486434d235ff70d344e3fa4e6d56a83705e1cc288efe219edceded06.vbs
Resource
win10v2004-en-20220112
General
-
Target
af4bb34b486434d235ff70d344e3fa4e6d56a83705e1cc288efe219edceded06.vbs
-
Size
162KB
-
MD5
c3c90a58ff247a052529de56f29ecf3c
-
SHA1
aa62c39357984dfa208c1ff7a0b76dc200c37b4d
-
SHA256
af4bb34b486434d235ff70d344e3fa4e6d56a83705e1cc288efe219edceded06
-
SHA512
6427d3abddaf44ce8d11fe686cfdf3d0fddfe9c910da406416da646aaf172d4514dbbd1419b8c2ea6fce13c538beee22b8c46adb6a4360c4d3626ba65f9d02f3
Malware Config
Extracted
revengerat
Client
kimjoy.ddns.net:6699
S1NTYL5X286LOEH
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
Processes:
powershell.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Installation.vbs powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Installation.vbs powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
powershell.exedescription pid process target process PID 2884 set thread context of 3388 2884 powershell.exe InstallUtil.exe -
Drops file in Windows directory 3 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Microsoft\Windows\DeliveryOptimization\State\keyValueLKG.dat svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotifyIcon.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotifyIcon.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotifyIcon.exe -
Modifies data under HKEY_USERS 49 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadRatePct = "100" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadPendingCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "1.746728" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.000000" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DownloadMode_BackCompat = "1" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PeerInfoCount = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Settings svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkCnt = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\KVFileExpirationTime = "132899121923648923" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\GeoVersion_EndpointFullUri = "https://geover.prod.do.dsp.mp.microsoft.com/geoversion" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CDNConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4116" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLanBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyLinkLocalBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CacheSizeBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UploadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadPendingCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCacheHostBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LinkLocalConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\FrDownloadRatePct = "90" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\PriorityDownloadCount = "0" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\CPUpct = "0.508907" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthlyUploadRestriction = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MemoryUsageKB = "4308" svchost.exe Key created \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\DODownloadMode = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyCdnBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateBkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\InternetConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyGroupBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\MonthID = "2" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Config\Geo_EndpointFullUri = "https://geo.prod.do.dsp.mp.microsoft.com/geo" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\GroupConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownlinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\NormalDownloadCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyInternetBytes = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\DownloadMonthlyRateFrBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\SwarmCount = "1" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\LANConnectionCount = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\UplinkUsageBps = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-20\SOFTWARE\Microsoft\Windows\CurrentVersion\DeliveryOptimization\Usage\BkDownloadRatePct = "45" svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 2884 powershell.exe 2884 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exeTiWorker.exedescription pid process Token: SeDebugPrivilege 2884 powershell.exe Token: SeSecurityPrivilege 1844 TiWorker.exe Token: SeRestorePrivilege 1844 TiWorker.exe Token: SeBackupPrivilege 1844 TiWorker.exe Token: SeBackupPrivilege 1844 TiWorker.exe Token: SeRestorePrivilege 1844 TiWorker.exe Token: SeSecurityPrivilege 1844 TiWorker.exe Token: SeBackupPrivilege 1844 TiWorker.exe Token: SeRestorePrivilege 1844 TiWorker.exe Token: SeSecurityPrivilege 1844 TiWorker.exe Token: SeBackupPrivilege 1844 TiWorker.exe Token: SeRestorePrivilege 1844 TiWorker.exe Token: SeSecurityPrivilege 1844 TiWorker.exe Token: SeBackupPrivilege 1844 TiWorker.exe Token: SeRestorePrivilege 1844 TiWorker.exe Token: SeSecurityPrivilege 1844 TiWorker.exe Token: SeBackupPrivilege 1844 TiWorker.exe Token: SeRestorePrivilege 1844 TiWorker.exe Token: SeSecurityPrivilege 1844 TiWorker.exe Token: SeBackupPrivilege 1844 TiWorker.exe Token: SeRestorePrivilege 1844 TiWorker.exe Token: SeSecurityPrivilege 1844 TiWorker.exe Token: SeBackupPrivilege 1844 TiWorker.exe Token: SeRestorePrivilege 1844 TiWorker.exe Token: SeSecurityPrivilege 1844 TiWorker.exe Token: SeBackupPrivilege 1844 TiWorker.exe Token: SeRestorePrivilege 1844 TiWorker.exe Token: SeSecurityPrivilege 1844 TiWorker.exe Token: SeBackupPrivilege 1844 TiWorker.exe Token: SeRestorePrivilege 1844 TiWorker.exe Token: SeSecurityPrivilege 1844 TiWorker.exe Token: SeBackupPrivilege 1844 TiWorker.exe Token: SeRestorePrivilege 1844 TiWorker.exe Token: SeSecurityPrivilege 1844 TiWorker.exe Token: SeBackupPrivilege 1844 TiWorker.exe Token: SeRestorePrivilege 1844 TiWorker.exe Token: SeSecurityPrivilege 1844 TiWorker.exe Token: SeBackupPrivilege 1844 TiWorker.exe Token: SeRestorePrivilege 1844 TiWorker.exe Token: SeSecurityPrivilege 1844 TiWorker.exe Token: SeBackupPrivilege 1844 TiWorker.exe Token: SeRestorePrivilege 1844 TiWorker.exe Token: SeSecurityPrivilege 1844 TiWorker.exe Token: SeBackupPrivilege 1844 TiWorker.exe Token: SeRestorePrivilege 1844 TiWorker.exe Token: SeSecurityPrivilege 1844 TiWorker.exe Token: SeBackupPrivilege 1844 TiWorker.exe Token: SeRestorePrivilege 1844 TiWorker.exe Token: SeSecurityPrivilege 1844 TiWorker.exe Token: SeBackupPrivilege 1844 TiWorker.exe Token: SeRestorePrivilege 1844 TiWorker.exe Token: SeSecurityPrivilege 1844 TiWorker.exe Token: SeBackupPrivilege 1844 TiWorker.exe Token: SeRestorePrivilege 1844 TiWorker.exe Token: SeSecurityPrivilege 1844 TiWorker.exe Token: SeBackupPrivilege 1844 TiWorker.exe Token: SeRestorePrivilege 1844 TiWorker.exe Token: SeSecurityPrivilege 1844 TiWorker.exe Token: SeBackupPrivilege 1844 TiWorker.exe Token: SeRestorePrivilege 1844 TiWorker.exe Token: SeSecurityPrivilege 1844 TiWorker.exe Token: SeBackupPrivilege 1844 TiWorker.exe Token: SeRestorePrivilege 1844 TiWorker.exe Token: SeSecurityPrivilege 1844 TiWorker.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
WScript.exepowershell.execsc.exedescription pid process target process PID 220 wrote to memory of 2884 220 WScript.exe powershell.exe PID 220 wrote to memory of 2884 220 WScript.exe powershell.exe PID 2884 wrote to memory of 2804 2884 powershell.exe csc.exe PID 2884 wrote to memory of 2804 2884 powershell.exe csc.exe PID 2804 wrote to memory of 2968 2804 csc.exe cvtres.exe PID 2804 wrote to memory of 2968 2804 csc.exe cvtres.exe PID 2884 wrote to memory of 3388 2884 powershell.exe InstallUtil.exe PID 2884 wrote to memory of 3388 2884 powershell.exe InstallUtil.exe PID 2884 wrote to memory of 3388 2884 powershell.exe InstallUtil.exe PID 2884 wrote to memory of 3388 2884 powershell.exe InstallUtil.exe PID 2884 wrote to memory of 3388 2884 powershell.exe InstallUtil.exe PID 2884 wrote to memory of 3388 2884 powershell.exe InstallUtil.exe PID 2884 wrote to memory of 3388 2884 powershell.exe InstallUtil.exe PID 2884 wrote to memory of 3388 2884 powershell.exe InstallUtil.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\af4bb34b486434d235ff70d344e3fa4e6d56a83705e1cc288efe219edceded06.vbs"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -eXEcUTiONpOLicY rEmOtEsIgNeD -FILE C:\Users\Admin\AppData\Local\Temp\OS64Bits.PS12⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\5aqmcxd5\5aqmcxd5.cmdline"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5879.tmp" "c:\Users\Admin\AppData\Local\Temp\5aqmcxd5\CSC84953BFF5604410E8B8DACAE38284EE4.TMP"4⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"3⤵
-
C:\Windows\system32\MusNotifyIcon.exe%systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 131⤵
- Checks processor information in registry
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5aqmcxd5\5aqmcxd5.dllMD5
c3886f86d2729a72c90d8e76d7aef92b
SHA180cb3c9053977575a9a0a2c88da9abf71cbc8fd2
SHA2566651ac2f07e9902ad2d587deaf22415e2d9eb724f1d2040ea8f80989e45cf555
SHA51201c7515d1e704f7be3e2c29dc68b3caae64699d3bba0233b9eacc5c6bdf06987d58b49dac27418e437c766c74c27e206e8f73dfb1a3050d4ffde8d28e4342467
-
C:\Users\Admin\AppData\Local\Temp\OS64Bits.PS1MD5
0572153c45a42e89a900e12008b17df6
SHA1dcc2cb82ddce82d1d6b1b7fc3d7143b4b1b3bffc
SHA256560cf733ab631e245bab376b9563d33f61376f99ef7a3a772abca6ef95c75d1b
SHA512096bc3866773dd6feb978c0fed1596d08e3636584feaaad7c7db887410ffa6da4c453c5b82fe001d882e237a951884b1b747642cb43c8325ec1ba70aecff6fce
-
C:\Users\Admin\AppData\Local\Temp\RES5879.tmpMD5
a4f095f321e92cc329f4a17234002460
SHA1118b182e56181faa873cf2a2b4fd83e32080cc2c
SHA256869bfaff9647ad108e83f6c8568544d69b71bd74fb005ab9ba60747c1e33ce48
SHA5126b16be5ba207a3f392dce37eacdb997384fa453d110958bea5fb82f7f01cfb683de6b692602745a2ac68167a6deecc57cffc4b2af474cacd917f009c1d64737a
-
\??\c:\Users\Admin\AppData\Local\Temp\5aqmcxd5\5aqmcxd5.0.csMD5
e03b1e7ba7f1a53a7e10c0fd9049f437
SHA13bb851a42717eeb588eb7deadfcd04c571c15f41
SHA2563ca2d456cf2f8d781f2134e1481bd787a9cb6f4bcaa2131ebbe0d47a0eb36427
SHA512a098a8e2a60a75357ee202ed4bbe6b86fa7b2ebae30574791e0d13dcf3ee95b841a14b51553c23b95af32a29cc2265afc285b3b0442f0454ea730de4d647383f
-
\??\c:\Users\Admin\AppData\Local\Temp\5aqmcxd5\5aqmcxd5.cmdlineMD5
f91d7d48b3e0ba55171b8647a19a4e15
SHA1275ea29d060fd0fd441cef2b7c0552aaa8b7a426
SHA256c2ca77e797bfe0b04914dd67484d18532ac756fb79a1891e6613869a402e8fd9
SHA5125906119ffb058fa023292c2ad7dec823a24c38f65d0c5a0885d4ed638d0c9401a946b1e87de60c2a07bb4aa45b5e0233dd99d2ad6880e41d261515b43a16257b
-
\??\c:\Users\Admin\AppData\Local\Temp\5aqmcxd5\CSC84953BFF5604410E8B8DACAE38284EE4.TMPMD5
e87ae795b14bbb287f400d49ef1832f7
SHA1bb0923ddca494a1b30226844e288e8732aeb35e6
SHA25659ab3508ba5dc5f0f0309f71a1d908c01e3383e48309a5fe1ae2e4b52d03e5b5
SHA5121712d569163c7d5d63029973880723597f202a247c67f01fa205c4f316a139790e2dd4f385ca670689c66c20132c65643aa4439af38dab6663d131062d3ed2c5
-
memory/2884-140-0x0000020B76B13000-0x0000020B76B15000-memory.dmpFilesize
8KB
-
memory/2884-142-0x0000020B79050000-0x0000020B790C6000-memory.dmpFilesize
472KB
-
memory/2884-141-0x0000020B76B16000-0x0000020B76B18000-memory.dmpFilesize
8KB
-
memory/2884-130-0x00007FFA6CA43000-0x00007FFA6CA45000-memory.dmpFilesize
8KB
-
memory/2884-139-0x0000020B76B10000-0x0000020B76B12000-memory.dmpFilesize
8KB
-
memory/2884-137-0x0000020B5CD90000-0x0000020B5CDB2000-memory.dmpFilesize
136KB
-
memory/3388-149-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/3388-151-0x0000000074D9E000-0x0000000074D9F000-memory.dmpFilesize
4KB
-
memory/3388-152-0x0000000005630000-0x0000000005BD4000-memory.dmpFilesize
5.6MB
-
memory/3388-153-0x0000000005270000-0x000000000530C000-memory.dmpFilesize
624KB
-
memory/3388-154-0x00000000051C0000-0x00000000051C1000-memory.dmpFilesize
4KB