Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
30-01-2021 19:46
Static task
static1
Behavioral task
behavioral1
Sample
rtyuu.exe
Resource
win7v20201028
General
-
Target
rtyuu.exe
-
Size
1.6MB
-
MD5
d30ff9ce946801b8590e2726b8154fea
-
SHA1
0ca3c4662dd05cee5aa1911940deebd598e10b83
-
SHA256
bc58f1f37527b2256089b3fedbf5044ad396b267a762ca7e7f6fa7c81f76259b
-
SHA512
7eb74a15da067728de3bec845930a3611e0e2be38ef927b896031e2f12b80c34cb1fc74b98f04af7d206a432e75ac48efc1200fbeaf7fea419bace6542e0c482
Malware Config
Extracted
Protocol: smtp- Host:
smtp.privateemail.com - Port:
587 - Username:
[email protected] - Password:
MARYolanmauluogwo@ever
Extracted
agenttesla
Protocol: smtp- Host:
smtp.privateemail.com - Port:
587 - Username:
[email protected] - Password:
MARYolanmauluogwo@ever
Extracted
matiex
Protocol: smtp- Host:
smtp.privateemail.com - Port:
587 - Username:
[email protected] - Password:
MARYolanmauluogwo@ever
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Matiex Main Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/412-21-0x0000000000400000-0x0000000000562000-memory.dmp family_matiex behavioral2/memory/412-22-0x000000000040104C-mapping.dmp family_matiex C:\Users\Admin\AppData\Local\Temp\Matiexgoods.exe family_matiex C:\Users\Admin\AppData\Local\Temp\Matiexgoods.exe family_matiex -
AgentTesla Payload 6 IoCs
Processes:
resource yara_rule behavioral2/memory/412-21-0x0000000000400000-0x0000000000562000-memory.dmp family_agenttesla behavioral2/memory/412-22-0x000000000040104C-mapping.dmp family_agenttesla C:\Users\Admin\AppData\Local\Temp\origigoods40.exe family_agenttesla C:\Users\Admin\AppData\Local\Temp\origigoods20.exe family_agenttesla C:\Users\Admin\AppData\Local\Temp\origigoods20.exe family_agenttesla C:\Users\Admin\AppData\Local\Temp\origigoods40.exe family_agenttesla -
Beds Protector Packer 1 IoCs
Detects Beds Protector packer used to load .NET malware.
Processes:
resource yara_rule behavioral2/memory/1456-9-0x0000000008CB0000-0x0000000008E3D000-memory.dmp beds_protector -
NirSoft MailPassView 7 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral2/memory/412-21-0x0000000000400000-0x0000000000562000-memory.dmp MailPassView behavioral2/memory/412-22-0x000000000040104C-mapping.dmp MailPassView C:\Users\Admin\AppData\Local\Temp\hawkgoods.exe MailPassView C:\Users\Admin\AppData\Local\Temp\hawkgoods.exe MailPassView behavioral2/memory/1524-70-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral2/memory/1524-71-0x0000000000411654-mapping.dmp MailPassView behavioral2/memory/1524-74-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView -
NirSoft WebBrowserPassView 7 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral2/memory/412-21-0x0000000000400000-0x0000000000562000-memory.dmp WebBrowserPassView behavioral2/memory/412-22-0x000000000040104C-mapping.dmp WebBrowserPassView C:\Users\Admin\AppData\Local\Temp\hawkgoods.exe WebBrowserPassView C:\Users\Admin\AppData\Local\Temp\hawkgoods.exe WebBrowserPassView behavioral2/memory/2944-76-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView behavioral2/memory/2944-77-0x0000000000442628-mapping.dmp WebBrowserPassView behavioral2/memory/2944-78-0x0000000000400000-0x0000000000458000-memory.dmp WebBrowserPassView -
Nirsoft 10 IoCs
Processes:
resource yara_rule behavioral2/memory/412-21-0x0000000000400000-0x0000000000562000-memory.dmp Nirsoft behavioral2/memory/412-22-0x000000000040104C-mapping.dmp Nirsoft C:\Users\Admin\AppData\Local\Temp\hawkgoods.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\hawkgoods.exe Nirsoft behavioral2/memory/1524-70-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/1524-71-0x0000000000411654-mapping.dmp Nirsoft behavioral2/memory/1524-74-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral2/memory/2944-76-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft behavioral2/memory/2944-77-0x0000000000442628-mapping.dmp Nirsoft behavioral2/memory/2944-78-0x0000000000400000-0x0000000000458000-memory.dmp Nirsoft -
Executes dropped EXE 4 IoCs
Processes:
hawkgoods.exeorigigoods40.exeMatiexgoods.exeorigigoods20.exepid process 3736 hawkgoods.exe 4044 origigoods40.exe 60 Matiexgoods.exe 416 origigoods20.exe -
Drops startup file 2 IoCs
Processes:
Powershell.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\I$s#$lT3ssl.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\I$s#$lT3ssl.exe Powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 checkip.dyndns.org 10 freegeoip.app 11 freegeoip.app 15 whatismyipaddress.com -
Suspicious use of SetThreadContext 3 IoCs
Processes:
rtyuu.exehawkgoods.exedescription pid process target process PID 1456 set thread context of 412 1456 rtyuu.exe RegAsm.exe PID 3736 set thread context of 1524 3736 hawkgoods.exe vbc.exe PID 3736 set thread context of 2944 3736 hawkgoods.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
rtyuu.exePowershell.exeorigigoods40.exeorigigoods20.exeMatiexgoods.exevbc.exehawkgoods.exepid process 1456 rtyuu.exe 1456 rtyuu.exe 1456 rtyuu.exe 1456 rtyuu.exe 2272 Powershell.exe 2272 Powershell.exe 2272 Powershell.exe 4044 origigoods40.exe 4044 origigoods40.exe 416 origigoods20.exe 416 origigoods20.exe 60 Matiexgoods.exe 2944 vbc.exe 2944 vbc.exe 3736 hawkgoods.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Matiexgoods.exepid process 60 Matiexgoods.exe -
Suspicious behavior: SetClipboardViewer 2 IoCs
Processes:
origigoods20.exeorigigoods40.exepid process 416 origigoods20.exe 4044 origigoods40.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
rtyuu.exePowershell.exeorigigoods40.exeorigigoods20.exeMatiexgoods.exehawkgoods.exedescription pid process Token: SeDebugPrivilege 1456 rtyuu.exe Token: SeDebugPrivilege 2272 Powershell.exe Token: SeDebugPrivilege 4044 origigoods40.exe Token: SeDebugPrivilege 416 origigoods20.exe Token: SeDebugPrivilege 60 Matiexgoods.exe Token: SeDebugPrivilege 3736 hawkgoods.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
RegAsm.exeMatiexgoods.exehawkgoods.exeorigigoods40.exeorigigoods20.exepid process 412 RegAsm.exe 60 Matiexgoods.exe 3736 hawkgoods.exe 4044 origigoods40.exe 416 origigoods20.exe -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
rtyuu.exeRegAsm.exeMatiexgoods.exehawkgoods.exedescription pid process target process PID 1456 wrote to memory of 2272 1456 rtyuu.exe Powershell.exe PID 1456 wrote to memory of 2272 1456 rtyuu.exe Powershell.exe PID 1456 wrote to memory of 2272 1456 rtyuu.exe Powershell.exe PID 1456 wrote to memory of 688 1456 rtyuu.exe RegAsm.exe PID 1456 wrote to memory of 688 1456 rtyuu.exe RegAsm.exe PID 1456 wrote to memory of 688 1456 rtyuu.exe RegAsm.exe PID 1456 wrote to memory of 3996 1456 rtyuu.exe RegAsm.exe PID 1456 wrote to memory of 3996 1456 rtyuu.exe RegAsm.exe PID 1456 wrote to memory of 3996 1456 rtyuu.exe RegAsm.exe PID 1456 wrote to memory of 412 1456 rtyuu.exe RegAsm.exe PID 1456 wrote to memory of 412 1456 rtyuu.exe RegAsm.exe PID 1456 wrote to memory of 412 1456 rtyuu.exe RegAsm.exe PID 1456 wrote to memory of 412 1456 rtyuu.exe RegAsm.exe PID 1456 wrote to memory of 412 1456 rtyuu.exe RegAsm.exe PID 1456 wrote to memory of 412 1456 rtyuu.exe RegAsm.exe PID 1456 wrote to memory of 412 1456 rtyuu.exe RegAsm.exe PID 412 wrote to memory of 3736 412 RegAsm.exe hawkgoods.exe PID 412 wrote to memory of 3736 412 RegAsm.exe hawkgoods.exe PID 412 wrote to memory of 3736 412 RegAsm.exe hawkgoods.exe PID 412 wrote to memory of 4044 412 RegAsm.exe origigoods40.exe PID 412 wrote to memory of 4044 412 RegAsm.exe origigoods40.exe PID 412 wrote to memory of 4044 412 RegAsm.exe origigoods40.exe PID 412 wrote to memory of 60 412 RegAsm.exe Matiexgoods.exe PID 412 wrote to memory of 60 412 RegAsm.exe Matiexgoods.exe PID 412 wrote to memory of 60 412 RegAsm.exe Matiexgoods.exe PID 412 wrote to memory of 416 412 RegAsm.exe origigoods20.exe PID 412 wrote to memory of 416 412 RegAsm.exe origigoods20.exe PID 412 wrote to memory of 416 412 RegAsm.exe origigoods20.exe PID 60 wrote to memory of 632 60 Matiexgoods.exe netsh.exe PID 60 wrote to memory of 632 60 Matiexgoods.exe netsh.exe PID 60 wrote to memory of 632 60 Matiexgoods.exe netsh.exe PID 3736 wrote to memory of 1524 3736 hawkgoods.exe vbc.exe PID 3736 wrote to memory of 1524 3736 hawkgoods.exe vbc.exe PID 3736 wrote to memory of 1524 3736 hawkgoods.exe vbc.exe PID 3736 wrote to memory of 1524 3736 hawkgoods.exe vbc.exe PID 3736 wrote to memory of 1524 3736 hawkgoods.exe vbc.exe PID 3736 wrote to memory of 1524 3736 hawkgoods.exe vbc.exe PID 3736 wrote to memory of 1524 3736 hawkgoods.exe vbc.exe PID 3736 wrote to memory of 1524 3736 hawkgoods.exe vbc.exe PID 3736 wrote to memory of 1524 3736 hawkgoods.exe vbc.exe PID 3736 wrote to memory of 2944 3736 hawkgoods.exe vbc.exe PID 3736 wrote to memory of 2944 3736 hawkgoods.exe vbc.exe PID 3736 wrote to memory of 2944 3736 hawkgoods.exe vbc.exe PID 3736 wrote to memory of 2944 3736 hawkgoods.exe vbc.exe PID 3736 wrote to memory of 2944 3736 hawkgoods.exe vbc.exe PID 3736 wrote to memory of 2944 3736 hawkgoods.exe vbc.exe PID 3736 wrote to memory of 2944 3736 hawkgoods.exe vbc.exe PID 3736 wrote to memory of 2944 3736 hawkgoods.exe vbc.exe PID 3736 wrote to memory of 2944 3736 hawkgoods.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\rtyuu.exe"C:\Users\Admin\AppData\Local\Temp\rtyuu.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\rtyuu.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\I$s#$lT3ssl.exe'2⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\hawkgoods.exe"C:\Users\Admin\AppData\Local\Temp\hawkgoods.exe" 03⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe /stext "C:\Users\Admin\AppData\Local\Temp\holderwb.txt"4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\origigoods40.exe"C:\Users\Admin\AppData\Local\Temp\origigoods40.exe" 03⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\origigoods20.exe"C:\Users\Admin\AppData\Local\Temp\origigoods20.exe" 03⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\Matiexgoods.exe"C:\Users\Admin\AppData\Local\Temp\Matiexgoods.exe" 03⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Matiexgoods.exeMD5
80c61b903400b534858d047dd0919f0e
SHA1d0ab5400b74392308140642c75f0897e16a88d60
SHA25625ade9899c000a27570b527cffc938ec9626978219ec8a086082b113cbe4f492
SHA512b3216f0e4e95c7f50bccba5fdcca2ad622a42379383be855546fa1e0bac41a6beea8226f8634ad5e0d8596169e0443494018bbe70b7052f094402aecaa038bce
-
C:\Users\Admin\AppData\Local\Temp\Matiexgoods.exeMD5
80c61b903400b534858d047dd0919f0e
SHA1d0ab5400b74392308140642c75f0897e16a88d60
SHA25625ade9899c000a27570b527cffc938ec9626978219ec8a086082b113cbe4f492
SHA512b3216f0e4e95c7f50bccba5fdcca2ad622a42379383be855546fa1e0bac41a6beea8226f8634ad5e0d8596169e0443494018bbe70b7052f094402aecaa038bce
-
C:\Users\Admin\AppData\Local\Temp\hawkgoods.exeMD5
ffdb58533d5d1362e896e96fb6f02a95
SHA1d6e4a3ca253bfc372a9a3180b5887c716ed285c6
SHA256b3d02fd5c69293db419ac03cdf6396bd5e7765682fb3b2390454d9a52ba2ca88
SHA5123ae6e49d3d728531201453a0bc27436b1a4305c8ef938b2cbb5e34ee45bb9a9a88cf2a41b08e4914fda9a96bbaa48bd999a2d2f1dffcd39761bb1f3620ca725f
-
C:\Users\Admin\AppData\Local\Temp\hawkgoods.exeMD5
ffdb58533d5d1362e896e96fb6f02a95
SHA1d6e4a3ca253bfc372a9a3180b5887c716ed285c6
SHA256b3d02fd5c69293db419ac03cdf6396bd5e7765682fb3b2390454d9a52ba2ca88
SHA5123ae6e49d3d728531201453a0bc27436b1a4305c8ef938b2cbb5e34ee45bb9a9a88cf2a41b08e4914fda9a96bbaa48bd999a2d2f1dffcd39761bb1f3620ca725f
-
C:\Users\Admin\AppData\Local\Temp\holderwb.txtMD5
f94dc819ca773f1e3cb27abbc9e7fa27
SHA19a7700efadc5ea09ab288544ef1e3cd876255086
SHA256a3377ade83786c2bdff5db19ff4dbfd796da4312402b5e77c4c63e38cc6eff92
SHA51272a2c10d7a53a7f9a319dab66d77ed65639e9aa885b551e0055fc7eaf6ef33bbf109205b42ae11555a0f292563914bc6edb63b310c6f9bda9564095f77ab9196
-
C:\Users\Admin\AppData\Local\Temp\origigoods20.exeMD5
61dc57c6575e1f3f2ae14c1b332ad2fb
SHA1f52f34623048e5fd720e97a72eedfd32358cd3a9
SHA2561c7757ee223f2480fbc478ae2ecaf82e1d3c17f2e4d47581d3972416166c54ab
SHA51281a7db927f53660d3a04a161d5c18aab17d676bcc7ae0738ab786d9bee82b91016e54e6f70428aec4087961744be89b1511f9e07d8dabbe5c2a9d836722395a1
-
C:\Users\Admin\AppData\Local\Temp\origigoods20.exeMD5
61dc57c6575e1f3f2ae14c1b332ad2fb
SHA1f52f34623048e5fd720e97a72eedfd32358cd3a9
SHA2561c7757ee223f2480fbc478ae2ecaf82e1d3c17f2e4d47581d3972416166c54ab
SHA51281a7db927f53660d3a04a161d5c18aab17d676bcc7ae0738ab786d9bee82b91016e54e6f70428aec4087961744be89b1511f9e07d8dabbe5c2a9d836722395a1
-
C:\Users\Admin\AppData\Local\Temp\origigoods40.exeMD5
ae36f0d16230b9f41ffecbd3c5b1d660
SHA188afc2923d1eefb70bad3c0cd9304949954377ef
SHA256cfad1e486666ff3fb042ba0e9967634de1065f1bbd505c61b3295e55705a2a50
SHA5121e98aee7dc693822113dcde1446a5bed1c564b76eef39f39f3a5d98d7d2099cf69ac92717a3297afc7082203929f1e9437f21cb6bc690974a0ef6d6cf6e4393c
-
C:\Users\Admin\AppData\Local\Temp\origigoods40.exeMD5
ae36f0d16230b9f41ffecbd3c5b1d660
SHA188afc2923d1eefb70bad3c0cd9304949954377ef
SHA256cfad1e486666ff3fb042ba0e9967634de1065f1bbd505c61b3295e55705a2a50
SHA5121e98aee7dc693822113dcde1446a5bed1c564b76eef39f39f3a5d98d7d2099cf69ac92717a3297afc7082203929f1e9437f21cb6bc690974a0ef6d6cf6e4393c
-
memory/60-47-0x00000000001A0000-0x00000000001A1000-memory.dmpFilesize
4KB
-
memory/60-39-0x0000000000000000-mapping.dmp
-
memory/60-59-0x0000000004D10000-0x0000000004D11000-memory.dmpFilesize
4KB
-
memory/60-44-0x0000000073550000-0x0000000073C3E000-memory.dmpFilesize
6.9MB
-
memory/60-68-0x00000000066C0000-0x00000000066C1000-memory.dmpFilesize
4KB
-
memory/60-69-0x0000000004D13000-0x0000000004D15000-memory.dmpFilesize
8KB
-
memory/412-21-0x0000000000400000-0x0000000000562000-memory.dmpFilesize
1.4MB
-
memory/412-22-0x000000000040104C-mapping.dmp
-
memory/416-41-0x0000000000000000-mapping.dmp
-
memory/416-75-0x0000000000F31000-0x0000000000F32000-memory.dmpFilesize
4KB
-
memory/416-52-0x0000000000F30000-0x0000000000F31000-memory.dmpFilesize
4KB
-
memory/416-83-0x0000000000F32000-0x0000000000F33000-memory.dmpFilesize
4KB
-
memory/632-66-0x0000000000000000-mapping.dmp
-
memory/1456-6-0x0000000005570000-0x0000000005571000-memory.dmpFilesize
4KB
-
memory/1456-10-0x0000000008E40000-0x0000000008E41000-memory.dmpFilesize
4KB
-
memory/1456-12-0x00000000092A0000-0x00000000092A1000-memory.dmpFilesize
4KB
-
memory/1456-3-0x0000000000B30000-0x0000000000B31000-memory.dmpFilesize
4KB
-
memory/1456-18-0x00000000091D0000-0x00000000091DF000-memory.dmpFilesize
60KB
-
memory/1456-14-0x0000000005773000-0x0000000005775000-memory.dmpFilesize
8KB
-
memory/1456-11-0x00000000091E0000-0x00000000091E1000-memory.dmpFilesize
4KB
-
memory/1456-5-0x00000000059D0000-0x00000000059D1000-memory.dmpFilesize
4KB
-
memory/1456-9-0x0000000008CB0000-0x0000000008E3D000-memory.dmpFilesize
1.6MB
-
memory/1456-2-0x0000000073550000-0x0000000073C3E000-memory.dmpFilesize
6.9MB
-
memory/1456-8-0x0000000005500000-0x0000000005501000-memory.dmpFilesize
4KB
-
memory/1456-7-0x0000000005770000-0x0000000005771000-memory.dmpFilesize
4KB
-
memory/1524-70-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1524-74-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/1524-71-0x0000000000411654-mapping.dmp
-
memory/2272-19-0x0000000007080000-0x0000000007081000-memory.dmpFilesize
4KB
-
memory/2272-17-0x00000000076C0000-0x00000000076C1000-memory.dmpFilesize
4KB
-
memory/2272-40-0x0000000008660000-0x0000000008661000-memory.dmpFilesize
4KB
-
memory/2272-13-0x0000000000000000-mapping.dmp
-
memory/2272-15-0x0000000073550000-0x0000000073C3E000-memory.dmpFilesize
6.9MB
-
memory/2272-16-0x0000000004AC0000-0x0000000004AC1000-memory.dmpFilesize
4KB
-
memory/2272-20-0x0000000007082000-0x0000000007083000-memory.dmpFilesize
4KB
-
memory/2272-23-0x0000000007410000-0x0000000007411000-memory.dmpFilesize
4KB
-
memory/2272-31-0x0000000008390000-0x0000000008391000-memory.dmpFilesize
4KB
-
memory/2272-60-0x0000000009380000-0x0000000009381000-memory.dmpFilesize
4KB
-
memory/2272-61-0x00000000092A0000-0x00000000092A1000-memory.dmpFilesize
4KB
-
memory/2272-62-0x0000000009310000-0x0000000009311000-memory.dmpFilesize
4KB
-
memory/2272-30-0x0000000007610000-0x0000000007611000-memory.dmpFilesize
4KB
-
memory/2272-67-0x0000000007083000-0x0000000007084000-memory.dmpFilesize
4KB
-
memory/2272-25-0x0000000007650000-0x0000000007651000-memory.dmpFilesize
4KB
-
memory/2272-24-0x00000000074B0000-0x00000000074B1000-memory.dmpFilesize
4KB
-
memory/2944-76-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/2944-77-0x0000000000442628-mapping.dmp
-
memory/2944-78-0x0000000000400000-0x0000000000458000-memory.dmpFilesize
352KB
-
memory/3736-32-0x0000000000000000-mapping.dmp
-
memory/3736-49-0x0000000003260000-0x0000000003261000-memory.dmpFilesize
4KB
-
memory/3736-80-0x0000000003261000-0x0000000003262000-memory.dmpFilesize
4KB
-
memory/4044-58-0x00000000053C0000-0x00000000053C1000-memory.dmpFilesize
4KB
-
memory/4044-72-0x0000000005450000-0x0000000005451000-memory.dmpFilesize
4KB
-
memory/4044-38-0x0000000073550000-0x0000000073C3E000-memory.dmpFilesize
6.9MB
-
memory/4044-35-0x0000000000000000-mapping.dmp
-
memory/4044-48-0x0000000000A60000-0x0000000000A61000-memory.dmpFilesize
4KB