Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
10-03-2021 12:43
Static task
static1
Behavioral task
behavioral1
Sample
02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe
Resource
win10v20201028
General
-
Target
02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe
-
Size
289KB
-
MD5
a3ed7dde4a9506eb99ebcffd889ff2f5
-
SHA1
63b6c363ad8f8826b61f1368fa55a8df868b7182
-
SHA256
02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c
-
SHA512
86d13fc17500342e63e5ddf0c430a6ac45d9210ff588d8885a318abf530fefcf80f7e03346dec78881c3596b29db3d80ca291abe4ea0d1d4ed5c993ae9a46fa4
Malware Config
Extracted
smokeloader
2019
http://10022020newfolder1002002131-service1002.space/
http://10022020newfolder1002002231-service1002.space/
http://10022020newfolder3100231-service1002.space/
http://10022020newfolder1002002431-service1002.space/
http://10022020newfolder1002002531-service1002.space/
http://10022020newfolder33417-01242510022020.space/
http://10022020test125831-service1002012510022020.space/
http://10022020test136831-service1002012510022020.space/
http://10022020test147831-service1002012510022020.space/
http://10022020test146831-service1002012510022020.space/
http://10022020test134831-service1002012510022020.space/
http://10022020est213531-service100201242510022020.ru/
http://10022020yes1t3481-service1002012510022020.ru/
http://10022020test13561-service1002012510022020.su/
http://10022020test14781-service1002012510022020.info/
http://10022020test13461-service1002012510022020.net/
http://10022020test15671-service1002012510022020.tech/
http://10022020test12671-service1002012510022020.online/
http://10022020utest1341-service1002012510022020.ru/
http://10022020uest71-service100201dom2510022020.ru/
http://10022020test61-service1002012510022020.website/
http://10022020test51-service1002012510022020.xyz/
http://10022020test41-service100201pro2510022020.ru/
http://10022020yest31-service100201rus2510022020.ru/
http://10022020rest21-service1002012510022020.eu/
http://10022020test11-service1002012510022020.press/
http://10022020newfolder4561-service1002012510022020.ru/
http://10022020rustest213-service1002012510022020.ru/
http://10022020test281-service1002012510022020.ru/
http://10022020test261-service1002012510022020.space/
http://10022020yomtest251-service1002012510022020.ru/
http://10022020yirtest231-service1002012510022020.ru/
Extracted
raccoon
afefd33a49c7cbd55d417545269920f24c85aa37
-
url4cnc
https://telete.in/jagressor_kz
Extracted
raccoon
e71b51d358b75fe1407b56bf2284e3fac50c860f
-
url4cnc
https://telete.in/oidmrwednesday
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1036-141-0x0000000000400000-0x0000000000426000-memory.dmp family_redline behavioral1/memory/1036-142-0x000000000041E192-mapping.dmp family_redline behavioral1/memory/1036-145-0x0000000000400000-0x0000000000426000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 12 IoCs
Processes:
3A9.tmp.exe475.tmp.exe659.tmp.exe11BF.tmp.exe1421.tmp.exe2561.tmp.exe2BB8.tmp.exe794066702.exe1712476341.exevuwdjehvuwdjeh1712476341.exepid process 268 3A9.tmp.exe 576 475.tmp.exe 1884 659.tmp.exe 960 11BF.tmp.exe 780 1421.tmp.exe 1284 2561.tmp.exe 1620 2BB8.tmp.exe 1000 794066702.exe 628 1712476341.exe 1612 vuwdjeh 1240 vuwdjeh 1036 1712476341.exe -
Deletes itself 1 IoCs
Processes:
pid process 1260 -
Loads dropped DLL 17 IoCs
Processes:
02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe11BF.tmp.exeWerFault.exe1712476341.exeWerFault.exepid process 1732 02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe 960 11BF.tmp.exe 960 11BF.tmp.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 920 WerFault.exe 960 11BF.tmp.exe 920 WerFault.exe 628 1712476341.exe 1456 WerFault.exe 1456 WerFault.exe 1456 WerFault.exe 1456 WerFault.exe 1456 WerFault.exe -
Processes:
1712476341.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths 1712476341.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions 1712476341.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\1712476341.exe = "0" 1712476341.exe -
Processes:
1712476341.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1712476341.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1712476341.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
Processes:
1712476341.exepid process 628 1712476341.exe 628 1712476341.exe 628 1712476341.exe 628 1712476341.exe 628 1712476341.exe 628 1712476341.exe 628 1712476341.exe 628 1712476341.exe 628 1712476341.exe 628 1712476341.exe 628 1712476341.exe 628 1712476341.exe 628 1712476341.exe 628 1712476341.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exevuwdjeh1712476341.exedescription pid process target process PID 892 set thread context of 1732 892 02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe 02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe PID 1612 set thread context of 1240 1612 vuwdjeh vuwdjeh PID 628 set thread context of 1036 628 1712476341.exe 1712476341.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 920 1000 WerFault.exe 794066702.exe 1456 628 WerFault.exe 1712476341.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1588 timeout.exe -
Processes:
1712476341.exe475.tmp.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 1712476341.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 1712476341.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 475.tmp.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 475.tmp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
pid process 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 -
Suspicious behavior: MapViewOfSection 19 IoCs
Processes:
02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exepid process 1732 02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
11BF.tmp.exeWerFault.exe1712476341.exepowershell.exeWerFault.exedescription pid process Token: SeShutdownPrivilege 1260 Token: SeShutdownPrivilege 1260 Token: SeDebugPrivilege 960 11BF.tmp.exe Token: SeDebugPrivilege 920 WerFault.exe Token: SeShutdownPrivilege 1260 Token: SeDebugPrivilege 628 1712476341.exe Token: SeDebugPrivilege 1716 powershell.exe Token: SeDebugPrivilege 1456 WerFault.exe Token: SeShutdownPrivilege 1260 -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
pid process 1260 1260 1260 1260 1260 1260 -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
pid process 1260 1260 1260 1260 -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
3A9.tmp.exepid process 268 3A9.tmp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe11BF.tmp.exe794066702.exedescription pid process target process PID 892 wrote to memory of 1732 892 02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe 02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe PID 892 wrote to memory of 1732 892 02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe 02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe PID 892 wrote to memory of 1732 892 02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe 02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe PID 892 wrote to memory of 1732 892 02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe 02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe PID 892 wrote to memory of 1732 892 02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe 02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe PID 892 wrote to memory of 1732 892 02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe 02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe PID 892 wrote to memory of 1732 892 02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe 02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe PID 1260 wrote to memory of 268 1260 3A9.tmp.exe PID 1260 wrote to memory of 268 1260 3A9.tmp.exe PID 1260 wrote to memory of 268 1260 3A9.tmp.exe PID 1260 wrote to memory of 268 1260 3A9.tmp.exe PID 1260 wrote to memory of 576 1260 475.tmp.exe PID 1260 wrote to memory of 576 1260 475.tmp.exe PID 1260 wrote to memory of 576 1260 475.tmp.exe PID 1260 wrote to memory of 576 1260 475.tmp.exe PID 1260 wrote to memory of 1884 1260 659.tmp.exe PID 1260 wrote to memory of 1884 1260 659.tmp.exe PID 1260 wrote to memory of 1884 1260 659.tmp.exe PID 1260 wrote to memory of 1884 1260 659.tmp.exe PID 1260 wrote to memory of 960 1260 11BF.tmp.exe PID 1260 wrote to memory of 960 1260 11BF.tmp.exe PID 1260 wrote to memory of 960 1260 11BF.tmp.exe PID 1260 wrote to memory of 960 1260 11BF.tmp.exe PID 1260 wrote to memory of 780 1260 1421.tmp.exe PID 1260 wrote to memory of 780 1260 1421.tmp.exe PID 1260 wrote to memory of 780 1260 1421.tmp.exe PID 1260 wrote to memory of 780 1260 1421.tmp.exe PID 1260 wrote to memory of 1284 1260 2561.tmp.exe PID 1260 wrote to memory of 1284 1260 2561.tmp.exe PID 1260 wrote to memory of 1284 1260 2561.tmp.exe PID 1260 wrote to memory of 1284 1260 2561.tmp.exe PID 1260 wrote to memory of 1620 1260 2BB8.tmp.exe PID 1260 wrote to memory of 1620 1260 2BB8.tmp.exe PID 1260 wrote to memory of 1620 1260 2BB8.tmp.exe PID 1260 wrote to memory of 1620 1260 2BB8.tmp.exe PID 1260 wrote to memory of 1796 1260 explorer.exe PID 1260 wrote to memory of 1796 1260 explorer.exe PID 1260 wrote to memory of 1796 1260 explorer.exe PID 1260 wrote to memory of 1796 1260 explorer.exe PID 1260 wrote to memory of 1796 1260 explorer.exe PID 1260 wrote to memory of 1292 1260 explorer.exe PID 1260 wrote to memory of 1292 1260 explorer.exe PID 1260 wrote to memory of 1292 1260 explorer.exe PID 1260 wrote to memory of 1292 1260 explorer.exe PID 1260 wrote to memory of 940 1260 explorer.exe PID 1260 wrote to memory of 940 1260 explorer.exe PID 1260 wrote to memory of 940 1260 explorer.exe PID 1260 wrote to memory of 940 1260 explorer.exe PID 1260 wrote to memory of 940 1260 explorer.exe PID 1260 wrote to memory of 764 1260 explorer.exe PID 1260 wrote to memory of 764 1260 explorer.exe PID 1260 wrote to memory of 764 1260 explorer.exe PID 1260 wrote to memory of 764 1260 explorer.exe PID 960 wrote to memory of 1000 960 11BF.tmp.exe 794066702.exe PID 960 wrote to memory of 1000 960 11BF.tmp.exe 794066702.exe PID 960 wrote to memory of 1000 960 11BF.tmp.exe 794066702.exe PID 960 wrote to memory of 1000 960 11BF.tmp.exe 794066702.exe PID 1000 wrote to memory of 920 1000 794066702.exe WerFault.exe PID 1000 wrote to memory of 920 1000 794066702.exe WerFault.exe PID 1000 wrote to memory of 920 1000 794066702.exe WerFault.exe PID 1000 wrote to memory of 920 1000 794066702.exe WerFault.exe PID 960 wrote to memory of 628 960 11BF.tmp.exe 1712476341.exe PID 960 wrote to memory of 628 960 11BF.tmp.exe 1712476341.exe PID 960 wrote to memory of 628 960 11BF.tmp.exe 1712476341.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
1712476341.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 1712476341.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe"C:\Users\Admin\AppData\Local\Temp\02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe"C:\Users\Admin\AppData\Local\Temp\02d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c.exe"2⤵
- Loads dropped DLL
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\3A9.tmp.exeC:\Users\Admin\AppData\Local\Temp\3A9.tmp.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\475.tmp.exeC:\Users\Admin\AppData\Local\Temp\475.tmp.exe1⤵
- Executes dropped EXE
- Modifies system certificate store
-
C:\Users\Admin\AppData\Local\Temp\659.tmp.exeC:\Users\Admin\AppData\Local\Temp\659.tmp.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\11BF.tmp.exeC:\Users\Admin\AppData\Local\Temp\11BF.tmp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\794066702.exe"C:\Users\Admin\AppData\Local\Temp\794066702.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1000 -s 883⤵
- Loads dropped DLL
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1712476341.exe"C:\Users\Admin\AppData\Local\Temp\1712476341.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- System policy modification
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1712476341.exe" -Force3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 13⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 14⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\1712476341.exe"C:\Users\Admin\AppData\Local\Temp\1712476341.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 17563⤵
- Loads dropped DLL
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1421.tmp.exeC:\Users\Admin\AppData\Local\Temp\1421.tmp.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\2561.tmp.exeC:\Users\Admin\AppData\Local\Temp\2561.tmp.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\2BB8.tmp.exeC:\Users\Admin\AppData\Local\Temp\2BB8.tmp.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {EA627DB4-2862-4A19-AD5A-41BAA475AE6C} S-1-5-21-3825035466-2522850611-591511364-1000:EIDQHRRL\Admin:Interactive:[1]1⤵
-
C:\Users\Admin\AppData\Roaming\vuwdjehC:\Users\Admin\AppData\Roaming\vuwdjeh2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\vuwdjehC:\Users\Admin\AppData\Roaming\vuwdjeh3⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\11BF.tmp.exeMD5
5c9e61f7399d08070ee86d8796b4b126
SHA112e16e5c06ae479d216975ac63ac6a935ec9b189
SHA25623861faf3ed06c8f76c905f6d592e3aacd4adfb0a63a3af08f94aa42c1a3f57f
SHA512bc5243e325e9c57b743bf1919b84bff709387554b2f028a37aefcfa7b0e8f61c3265666d5a99e7fc24c5cae85ed7240f6856b70e70bd3c28d236edcb7fcc4226
-
C:\Users\Admin\AppData\Local\Temp\1421.tmp.exeMD5
5e3934b529f0da8dbfbea6e450da9366
SHA1b7c2c1e814872054f57dff09877d83664755d1db
SHA256daddac7ce81255b60d379d725784d01323967ad10439520486bb1322b3fe70b0
SHA5123ee6dede5023497e410e95ccc55d0662fb653534fab739330a0c98ccb5bd02d05ff95652ea0931ec575ac28cc84430945aa9be3f7a113ae2feef101f8ac76103
-
C:\Users\Admin\AppData\Local\Temp\1421.tmp.exeMD5
5e3934b529f0da8dbfbea6e450da9366
SHA1b7c2c1e814872054f57dff09877d83664755d1db
SHA256daddac7ce81255b60d379d725784d01323967ad10439520486bb1322b3fe70b0
SHA5123ee6dede5023497e410e95ccc55d0662fb653534fab739330a0c98ccb5bd02d05ff95652ea0931ec575ac28cc84430945aa9be3f7a113ae2feef101f8ac76103
-
C:\Users\Admin\AppData\Local\Temp\1712476341.exeMD5
0230b090e69b97194d25a53f2d5514eb
SHA1ac76b29802d240f721fb09adff57950f32989fb7
SHA2561b51a62c1d975227247671411dfa82b3521e82eeaa665e420e81e1f8bf0616f7
SHA5124f907e2624cf9c87c8d5aae709329f20cd59077ba370ba7b581100aa980cb9a92186b4f8436568bb0b8d1ef3551b514c967febdf2f717f3be718a8bc39035907
-
C:\Users\Admin\AppData\Local\Temp\1712476341.exeMD5
0230b090e69b97194d25a53f2d5514eb
SHA1ac76b29802d240f721fb09adff57950f32989fb7
SHA2561b51a62c1d975227247671411dfa82b3521e82eeaa665e420e81e1f8bf0616f7
SHA5124f907e2624cf9c87c8d5aae709329f20cd59077ba370ba7b581100aa980cb9a92186b4f8436568bb0b8d1ef3551b514c967febdf2f717f3be718a8bc39035907
-
C:\Users\Admin\AppData\Local\Temp\1712476341.exeMD5
0230b090e69b97194d25a53f2d5514eb
SHA1ac76b29802d240f721fb09adff57950f32989fb7
SHA2561b51a62c1d975227247671411dfa82b3521e82eeaa665e420e81e1f8bf0616f7
SHA5124f907e2624cf9c87c8d5aae709329f20cd59077ba370ba7b581100aa980cb9a92186b4f8436568bb0b8d1ef3551b514c967febdf2f717f3be718a8bc39035907
-
C:\Users\Admin\AppData\Local\Temp\2561.tmp.exeMD5
c7f652696b54fdf5c5dad47975448ce7
SHA1cae356fc48de43f51f32c12df8348fe91ab4188e
SHA25633ea1f44e2f0da77c151f986193bab435fc5219ae749f94875005c888248c527
SHA512482df6cad1f82194e494b5f416d810b4057043d712efbaf23bb50e556df4e61856018a4509ac5c3601b0aec047af44bed2f4f7dbcfb92722754eff3b453fb409
-
C:\Users\Admin\AppData\Local\Temp\2BB8.tmp.exeMD5
c7f652696b54fdf5c5dad47975448ce7
SHA1cae356fc48de43f51f32c12df8348fe91ab4188e
SHA25633ea1f44e2f0da77c151f986193bab435fc5219ae749f94875005c888248c527
SHA512482df6cad1f82194e494b5f416d810b4057043d712efbaf23bb50e556df4e61856018a4509ac5c3601b0aec047af44bed2f4f7dbcfb92722754eff3b453fb409
-
C:\Users\Admin\AppData\Local\Temp\3A9.tmp.exeMD5
a69e12607d01237460808fa1709e5e86
SHA14a12f82aee1c90e70cdf6be863ce1a749c8ae411
SHA256188e05efb42c1f7fdb5c910a6614f710a87ae642b23ac9ffe3f75246744865bc
SHA5127533e6da6bac0405fc8b608da8020b54b6ee02592e6fd40ea342e130a8a876ae5ef4a1fd636d95e76339dbf8be45cecbd22ca2d0a4635b055ffafec3d7e15284
-
C:\Users\Admin\AppData\Local\Temp\475.tmp.exeMD5
c7f652696b54fdf5c5dad47975448ce7
SHA1cae356fc48de43f51f32c12df8348fe91ab4188e
SHA25633ea1f44e2f0da77c151f986193bab435fc5219ae749f94875005c888248c527
SHA512482df6cad1f82194e494b5f416d810b4057043d712efbaf23bb50e556df4e61856018a4509ac5c3601b0aec047af44bed2f4f7dbcfb92722754eff3b453fb409
-
C:\Users\Admin\AppData\Local\Temp\4DD3.tmpMD5
d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
C:\Users\Admin\AppData\Local\Temp\659.tmp.exeMD5
ea4a809ecedea2b54313bab7cc52fc48
SHA17e00349f9224a67c1fc65867e96c555767b94e3f
SHA2565fbf24a8e653dc222738a40a813202fa5da1f401e2e810eeee2cef4681555011
SHA51287a8454c5cdfd2de794606295bd56cfd1d62eb030f5ce67741f8c8c04573e4d1c1be8cbf9028a4447fa95a08f7b9da72ea43b07a31f424bf1cadba1a6b4be234
-
C:\Users\Admin\AppData\Local\Temp\794066702.exeMD5
58f807333c6bf89503690d4ac187a596
SHA16835874207df9383886662a5f0378e0d760c1a94
SHA25618b2fb824c91d5901e2b6a2515b62de3b7b541353c5b2c79709505bc477b7b1a
SHA5120eba783fdebe3c6ec2fa58cc196c23f407eddcc617d0a2904fb484efd148fba1c1aed7e3533b0c9927e192aab508ae36e5e2d4d3519b3a677cb15ca64ad71cb4
-
C:\Users\Admin\AppData\Local\Temp\794066702.exeMD5
58f807333c6bf89503690d4ac187a596
SHA16835874207df9383886662a5f0378e0d760c1a94
SHA25618b2fb824c91d5901e2b6a2515b62de3b7b541353c5b2c79709505bc477b7b1a
SHA5120eba783fdebe3c6ec2fa58cc196c23f407eddcc617d0a2904fb484efd148fba1c1aed7e3533b0c9927e192aab508ae36e5e2d4d3519b3a677cb15ca64ad71cb4
-
C:\Users\Admin\AppData\Roaming\vuwdjehMD5
a3ed7dde4a9506eb99ebcffd889ff2f5
SHA163b6c363ad8f8826b61f1368fa55a8df868b7182
SHA25602d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c
SHA51286d13fc17500342e63e5ddf0c430a6ac45d9210ff588d8885a318abf530fefcf80f7e03346dec78881c3596b29db3d80ca291abe4ea0d1d4ed5c993ae9a46fa4
-
C:\Users\Admin\AppData\Roaming\vuwdjehMD5
a3ed7dde4a9506eb99ebcffd889ff2f5
SHA163b6c363ad8f8826b61f1368fa55a8df868b7182
SHA25602d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c
SHA51286d13fc17500342e63e5ddf0c430a6ac45d9210ff588d8885a318abf530fefcf80f7e03346dec78881c3596b29db3d80ca291abe4ea0d1d4ed5c993ae9a46fa4
-
C:\Users\Admin\AppData\Roaming\vuwdjehMD5
a3ed7dde4a9506eb99ebcffd889ff2f5
SHA163b6c363ad8f8826b61f1368fa55a8df868b7182
SHA25602d1136079dc3aee91af021a5fc064106ddb2c0f61359b878fe97a8667cabb1c
SHA51286d13fc17500342e63e5ddf0c430a6ac45d9210ff588d8885a318abf530fefcf80f7e03346dec78881c3596b29db3d80ca291abe4ea0d1d4ed5c993ae9a46fa4
-
\Users\Admin\AppData\Local\Temp\1712476341.exeMD5
0230b090e69b97194d25a53f2d5514eb
SHA1ac76b29802d240f721fb09adff57950f32989fb7
SHA2561b51a62c1d975227247671411dfa82b3521e82eeaa665e420e81e1f8bf0616f7
SHA5124f907e2624cf9c87c8d5aae709329f20cd59077ba370ba7b581100aa980cb9a92186b4f8436568bb0b8d1ef3551b514c967febdf2f717f3be718a8bc39035907
-
\Users\Admin\AppData\Local\Temp\1712476341.exeMD5
0230b090e69b97194d25a53f2d5514eb
SHA1ac76b29802d240f721fb09adff57950f32989fb7
SHA2561b51a62c1d975227247671411dfa82b3521e82eeaa665e420e81e1f8bf0616f7
SHA5124f907e2624cf9c87c8d5aae709329f20cd59077ba370ba7b581100aa980cb9a92186b4f8436568bb0b8d1ef3551b514c967febdf2f717f3be718a8bc39035907
-
\Users\Admin\AppData\Local\Temp\1712476341.exeMD5
0230b090e69b97194d25a53f2d5514eb
SHA1ac76b29802d240f721fb09adff57950f32989fb7
SHA2561b51a62c1d975227247671411dfa82b3521e82eeaa665e420e81e1f8bf0616f7
SHA5124f907e2624cf9c87c8d5aae709329f20cd59077ba370ba7b581100aa980cb9a92186b4f8436568bb0b8d1ef3551b514c967febdf2f717f3be718a8bc39035907
-
\Users\Admin\AppData\Local\Temp\1712476341.exeMD5
0230b090e69b97194d25a53f2d5514eb
SHA1ac76b29802d240f721fb09adff57950f32989fb7
SHA2561b51a62c1d975227247671411dfa82b3521e82eeaa665e420e81e1f8bf0616f7
SHA5124f907e2624cf9c87c8d5aae709329f20cd59077ba370ba7b581100aa980cb9a92186b4f8436568bb0b8d1ef3551b514c967febdf2f717f3be718a8bc39035907
-
\Users\Admin\AppData\Local\Temp\1712476341.exeMD5
0230b090e69b97194d25a53f2d5514eb
SHA1ac76b29802d240f721fb09adff57950f32989fb7
SHA2561b51a62c1d975227247671411dfa82b3521e82eeaa665e420e81e1f8bf0616f7
SHA5124f907e2624cf9c87c8d5aae709329f20cd59077ba370ba7b581100aa980cb9a92186b4f8436568bb0b8d1ef3551b514c967febdf2f717f3be718a8bc39035907
-
\Users\Admin\AppData\Local\Temp\1712476341.exeMD5
0230b090e69b97194d25a53f2d5514eb
SHA1ac76b29802d240f721fb09adff57950f32989fb7
SHA2561b51a62c1d975227247671411dfa82b3521e82eeaa665e420e81e1f8bf0616f7
SHA5124f907e2624cf9c87c8d5aae709329f20cd59077ba370ba7b581100aa980cb9a92186b4f8436568bb0b8d1ef3551b514c967febdf2f717f3be718a8bc39035907
-
\Users\Admin\AppData\Local\Temp\1712476341.exeMD5
0230b090e69b97194d25a53f2d5514eb
SHA1ac76b29802d240f721fb09adff57950f32989fb7
SHA2561b51a62c1d975227247671411dfa82b3521e82eeaa665e420e81e1f8bf0616f7
SHA5124f907e2624cf9c87c8d5aae709329f20cd59077ba370ba7b581100aa980cb9a92186b4f8436568bb0b8d1ef3551b514c967febdf2f717f3be718a8bc39035907
-
\Users\Admin\AppData\Local\Temp\4DD3.tmpMD5
d124f55b9393c976963407dff51ffa79
SHA12c7bbedd79791bfb866898c85b504186db610b5d
SHA256ea1e16247c848c8c171c4cd1fa17bc5a018a1fcb0c0dac25009066b6667b8eef
SHA512278fe3a4b1fbbe700e4f4483b610133e975e36e101455661d5197bd892a68839b9d555499040d200c92aefa9e3819380e395c0cd85d5fc845c6364d128a8cf06
-
\Users\Admin\AppData\Local\Temp\794066702.exeMD5
58f807333c6bf89503690d4ac187a596
SHA16835874207df9383886662a5f0378e0d760c1a94
SHA25618b2fb824c91d5901e2b6a2515b62de3b7b541353c5b2c79709505bc477b7b1a
SHA5120eba783fdebe3c6ec2fa58cc196c23f407eddcc617d0a2904fb484efd148fba1c1aed7e3533b0c9927e192aab508ae36e5e2d4d3519b3a677cb15ca64ad71cb4
-
\Users\Admin\AppData\Local\Temp\794066702.exeMD5
58f807333c6bf89503690d4ac187a596
SHA16835874207df9383886662a5f0378e0d760c1a94
SHA25618b2fb824c91d5901e2b6a2515b62de3b7b541353c5b2c79709505bc477b7b1a
SHA5120eba783fdebe3c6ec2fa58cc196c23f407eddcc617d0a2904fb484efd148fba1c1aed7e3533b0c9927e192aab508ae36e5e2d4d3519b3a677cb15ca64ad71cb4
-
\Users\Admin\AppData\Local\Temp\794066702.exeMD5
58f807333c6bf89503690d4ac187a596
SHA16835874207df9383886662a5f0378e0d760c1a94
SHA25618b2fb824c91d5901e2b6a2515b62de3b7b541353c5b2c79709505bc477b7b1a
SHA5120eba783fdebe3c6ec2fa58cc196c23f407eddcc617d0a2904fb484efd148fba1c1aed7e3533b0c9927e192aab508ae36e5e2d4d3519b3a677cb15ca64ad71cb4
-
\Users\Admin\AppData\Local\Temp\794066702.exeMD5
58f807333c6bf89503690d4ac187a596
SHA16835874207df9383886662a5f0378e0d760c1a94
SHA25618b2fb824c91d5901e2b6a2515b62de3b7b541353c5b2c79709505bc477b7b1a
SHA5120eba783fdebe3c6ec2fa58cc196c23f407eddcc617d0a2904fb484efd148fba1c1aed7e3533b0c9927e192aab508ae36e5e2d4d3519b3a677cb15ca64ad71cb4
-
\Users\Admin\AppData\Local\Temp\794066702.exeMD5
58f807333c6bf89503690d4ac187a596
SHA16835874207df9383886662a5f0378e0d760c1a94
SHA25618b2fb824c91d5901e2b6a2515b62de3b7b541353c5b2c79709505bc477b7b1a
SHA5120eba783fdebe3c6ec2fa58cc196c23f407eddcc617d0a2904fb484efd148fba1c1aed7e3533b0c9927e192aab508ae36e5e2d4d3519b3a677cb15ca64ad71cb4
-
\Users\Admin\AppData\Local\Temp\794066702.exeMD5
58f807333c6bf89503690d4ac187a596
SHA16835874207df9383886662a5f0378e0d760c1a94
SHA25618b2fb824c91d5901e2b6a2515b62de3b7b541353c5b2c79709505bc477b7b1a
SHA5120eba783fdebe3c6ec2fa58cc196c23f407eddcc617d0a2904fb484efd148fba1c1aed7e3533b0c9927e192aab508ae36e5e2d4d3519b3a677cb15ca64ad71cb4
-
\Users\Admin\AppData\Local\Temp\794066702.exeMD5
58f807333c6bf89503690d4ac187a596
SHA16835874207df9383886662a5f0378e0d760c1a94
SHA25618b2fb824c91d5901e2b6a2515b62de3b7b541353c5b2c79709505bc477b7b1a
SHA5120eba783fdebe3c6ec2fa58cc196c23f407eddcc617d0a2904fb484efd148fba1c1aed7e3533b0c9927e192aab508ae36e5e2d4d3519b3a677cb15ca64ad71cb4
-
\Users\Admin\AppData\Local\Temp\794066702.exeMD5
58f807333c6bf89503690d4ac187a596
SHA16835874207df9383886662a5f0378e0d760c1a94
SHA25618b2fb824c91d5901e2b6a2515b62de3b7b541353c5b2c79709505bc477b7b1a
SHA5120eba783fdebe3c6ec2fa58cc196c23f407eddcc617d0a2904fb484efd148fba1c1aed7e3533b0c9927e192aab508ae36e5e2d4d3519b3a677cb15ca64ad71cb4
-
\Users\Admin\AppData\Local\Temp\794066702.exeMD5
58f807333c6bf89503690d4ac187a596
SHA16835874207df9383886662a5f0378e0d760c1a94
SHA25618b2fb824c91d5901e2b6a2515b62de3b7b541353c5b2c79709505bc477b7b1a
SHA5120eba783fdebe3c6ec2fa58cc196c23f407eddcc617d0a2904fb484efd148fba1c1aed7e3533b0c9927e192aab508ae36e5e2d4d3519b3a677cb15ca64ad71cb4
-
memory/268-102-0x0000000000000000-mapping.dmp
-
memory/268-103-0x0000000000070000-0x0000000000076000-memory.dmpFilesize
24KB
-
memory/268-104-0x0000000000060000-0x000000000006B000-memory.dmpFilesize
44KB
-
memory/268-10-0x0000000000000000-mapping.dmp
-
memory/576-20-0x0000000000220000-0x00000000002B1000-memory.dmpFilesize
580KB
-
memory/576-18-0x0000000003000000-0x0000000003011000-memory.dmpFilesize
68KB
-
memory/576-21-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB
-
memory/576-14-0x0000000000000000-mapping.dmp
-
memory/628-88-0x0000000000000000-mapping.dmp
-
memory/628-91-0x0000000073F90000-0x000000007467E000-memory.dmpFilesize
6.9MB
-
memory/628-99-0x0000000004C50000-0x0000000004C51000-memory.dmpFilesize
4KB
-
memory/628-93-0x0000000000330000-0x0000000000331000-memory.dmpFilesize
4KB
-
memory/628-128-0x00000000004C0000-0x0000000000556000-memory.dmpFilesize
600KB
-
memory/764-76-0x0000000000060000-0x000000000006F000-memory.dmpFilesize
60KB
-
memory/764-75-0x0000000000070000-0x0000000000079000-memory.dmpFilesize
36KB
-
memory/764-69-0x0000000000000000-mapping.dmp
-
memory/780-31-0x0000000073F90000-0x000000007467E000-memory.dmpFilesize
6.9MB
-
memory/780-34-0x0000000000310000-0x0000000000311000-memory.dmpFilesize
4KB
-
memory/780-43-0x0000000002040000-0x0000000002041000-memory.dmpFilesize
4KB
-
memory/780-45-0x0000000000860000-0x0000000000867000-memory.dmpFilesize
28KB
-
memory/780-28-0x0000000000000000-mapping.dmp
-
memory/892-7-0x0000000000020000-0x000000000002D000-memory.dmpFilesize
52KB
-
memory/892-2-0x0000000000910000-0x0000000000921000-memory.dmpFilesize
68KB
-
memory/920-74-0x0000000000000000-mapping.dmp
-
memory/920-77-0x0000000001E60000-0x0000000001E71000-memory.dmpFilesize
68KB
-
memory/920-100-0x0000000002460000-0x0000000002471000-memory.dmpFilesize
68KB
-
memory/920-105-0x00000000008D0000-0x00000000008D1000-memory.dmpFilesize
4KB
-
memory/920-80-0x0000000001E60000-0x0000000001E71000-memory.dmpFilesize
68KB
-
memory/940-64-0x0000000000000000-mapping.dmp
-
memory/940-66-0x000000006F761000-0x000000006F763000-memory.dmpFilesize
8KB
-
memory/940-68-0x0000000000080000-0x000000000008B000-memory.dmpFilesize
44KB
-
memory/940-67-0x0000000000090000-0x0000000000097000-memory.dmpFilesize
28KB
-
memory/960-39-0x0000000001E90000-0x0000000001E99000-memory.dmpFilesize
36KB
-
memory/960-25-0x0000000073F90000-0x000000007467E000-memory.dmpFilesize
6.9MB
-
memory/960-22-0x0000000000000000-mapping.dmp
-
memory/960-24-0x0000000001F40000-0x0000000001F51000-memory.dmpFilesize
68KB
-
memory/960-36-0x0000000000810000-0x000000000081A000-memory.dmpFilesize
40KB
-
memory/960-40-0x0000000001EA1000-0x0000000001EA2000-memory.dmpFilesize
4KB
-
memory/960-44-0x0000000001EA4000-0x0000000001EA6000-memory.dmpFilesize
8KB
-
memory/960-42-0x0000000001EA3000-0x0000000001EA4000-memory.dmpFilesize
4KB
-
memory/960-41-0x0000000001EA2000-0x0000000001EA3000-memory.dmpFilesize
4KB
-
memory/1000-72-0x0000000000000000-mapping.dmp
-
memory/1036-141-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/1036-142-0x000000000041E192-mapping.dmp
-
memory/1036-144-0x0000000073F90000-0x000000007467E000-memory.dmpFilesize
6.9MB
-
memory/1036-145-0x0000000000400000-0x0000000000426000-memory.dmpFilesize
152KB
-
memory/1132-111-0x0000000000000000-mapping.dmp
-
memory/1132-112-0x0000000000070000-0x0000000000075000-memory.dmpFilesize
20KB
-
memory/1132-113-0x0000000000060000-0x0000000000069000-memory.dmpFilesize
36KB
-
memory/1176-110-0x0000000000080000-0x0000000000089000-memory.dmpFilesize
36KB
-
memory/1176-106-0x0000000000000000-mapping.dmp
-
memory/1176-109-0x0000000000090000-0x0000000000094000-memory.dmpFilesize
16KB
-
memory/1240-124-0x0000000000402A38-mapping.dmp
-
memory/1260-9-0x0000000003720000-0x0000000003737000-memory.dmpFilesize
92KB
-
memory/1284-48-0x0000000002DD0000-0x0000000002DE1000-memory.dmpFilesize
68KB
-
memory/1284-37-0x0000000000000000-mapping.dmp
-
memory/1292-57-0x0000000000000000-mapping.dmp
-
memory/1292-60-0x0000000000070000-0x0000000000077000-memory.dmpFilesize
28KB
-
memory/1292-61-0x0000000000060000-0x000000000006C000-memory.dmpFilesize
48KB
-
memory/1372-117-0x00000000000D0000-0x00000000000D5000-memory.dmpFilesize
20KB
-
memory/1372-118-0x00000000000C0000-0x00000000000C9000-memory.dmpFilesize
36KB
-
memory/1372-114-0x0000000000000000-mapping.dmp
-
memory/1456-155-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB
-
memory/1456-148-0x0000000002060000-0x0000000002071000-memory.dmpFilesize
68KB
-
memory/1456-147-0x0000000000000000-mapping.dmp
-
memory/1556-92-0x0000000000000000-mapping.dmp
-
memory/1556-97-0x00000000000D0000-0x00000000000D5000-memory.dmpFilesize
20KB
-
memory/1556-98-0x0000000000080000-0x0000000000089000-memory.dmpFilesize
36KB
-
memory/1584-131-0x0000000000000000-mapping.dmp
-
memory/1588-132-0x0000000000000000-mapping.dmp
-
memory/1612-120-0x0000000000000000-mapping.dmp
-
memory/1612-122-0x0000000000BC0000-0x0000000000BD1000-memory.dmpFilesize
68KB
-
memory/1620-58-0x0000000002E90000-0x0000000002EA1000-memory.dmpFilesize
68KB
-
memory/1620-46-0x0000000000000000-mapping.dmp
-
memory/1716-135-0x0000000004850000-0x0000000004851000-memory.dmpFilesize
4KB
-
memory/1716-138-0x0000000004810000-0x0000000004811000-memory.dmpFilesize
4KB
-
memory/1716-139-0x0000000004812000-0x0000000004813000-memory.dmpFilesize
4KB
-
memory/1716-164-0x00000000056B0000-0x00000000056B1000-memory.dmpFilesize
4KB
-
memory/1716-159-0x0000000005610000-0x0000000005611000-memory.dmpFilesize
4KB
-
memory/1716-156-0x0000000005280000-0x0000000005281000-memory.dmpFilesize
4KB
-
memory/1716-153-0x0000000001050000-0x0000000001051000-memory.dmpFilesize
4KB
-
memory/1716-134-0x0000000000AB0000-0x0000000000AB1000-memory.dmpFilesize
4KB
-
memory/1716-133-0x0000000073F90000-0x000000007467E000-memory.dmpFilesize
6.9MB
-
memory/1716-129-0x0000000000000000-mapping.dmp
-
memory/1732-4-0x0000000000402A38-mapping.dmp
-
memory/1732-5-0x0000000075BF1000-0x0000000075BF3000-memory.dmpFilesize
8KB
-
memory/1732-3-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/1796-56-0x0000000000080000-0x00000000000EB000-memory.dmpFilesize
428KB
-
memory/1796-55-0x00000000004C0000-0x0000000000534000-memory.dmpFilesize
464KB
-
memory/1796-52-0x000000006F8D1000-0x000000006F8D3000-memory.dmpFilesize
8KB
-
memory/1796-50-0x0000000000000000-mapping.dmp
-
memory/1884-26-0x0000000002F00000-0x0000000002F11000-memory.dmpFilesize
68KB
-
memory/1884-32-0x0000000002BF0000-0x0000000002C81000-memory.dmpFilesize
580KB
-
memory/1884-16-0x0000000000000000-mapping.dmp
-
memory/1884-33-0x0000000000400000-0x0000000000492000-memory.dmpFilesize
584KB