Analysis
-
max time kernel
134s -
max time network
54s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
13-05-2021 12:53
Static task
static1
Behavioral task
behavioral1
Sample
f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe
Resource
win10v20210408
General
-
Target
f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe
-
Size
414KB
-
MD5
bf1583e63f772d707c116cc80c76e3d7
-
SHA1
7442f1317aeb7fdd6da7274e8abe115f20a5958b
-
SHA256
f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3
-
SHA512
b0770e6edeebd12e19a6facb14b7537a88ecfbd5f670cf80a6c4a55ff5bb3f9268e9c7f786b2c6aaffecec663a3b457e8aefbfcc24d05fbec0d542e17d4e04e7
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs
-
Adds policy Run key to start application 2 TTPs 6 IoCs
Processes:
WScript.exeWScript.exeWScript.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\GFBFPSXA = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\GFBFPSXA = "W_X_C.bat" WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\GFBFPSXA = "W_X_C.bat" WScript.exe -
Executes dropped EXE 6 IoCs
Processes:
avscan.exeavscan.exehosts.exehosts.exeavscan.exehosts.exepid process 2608 avscan.exe 1588 avscan.exe 2112 hosts.exe 2976 hosts.exe 3920 avscan.exe 2384 hosts.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exeavscan.exehosts.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run avscan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" avscan.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run hosts.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" hosts.exe -
Drops file in Windows directory 5 IoCs
Processes:
avscan.exehosts.exef48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exedescription ioc process File opened for modification C:\Windows\hosts.exe avscan.exe File opened for modification C:\Windows\hosts.exe hosts.exe File created C:\windows\W_X_C.vbs f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe File created \??\c:\windows\W_X_C.bat f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe File opened for modification C:\Windows\hosts.exe f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 4 IoCs
Processes:
cmd.execmd.execmd.exef48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe -
Modifies registry key 1 TTPs 9 IoCs
Processes:
REG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exeREG.exepid process 3420 REG.exe 1348 REG.exe 2888 REG.exe 3620 REG.exe 3856 REG.exe 64 REG.exe 2292 REG.exe 2644 REG.exe 3028 REG.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
Processes:
f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exeavscan.exehosts.exepid process 1000 f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe 2608 avscan.exe 2112 hosts.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exeavscan.exeavscan.exehosts.exehosts.exeavscan.exehosts.exepid process 1000 f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe 2608 avscan.exe 1588 avscan.exe 2112 hosts.exe 2976 hosts.exe 3920 avscan.exe 2384 hosts.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exeavscan.execmd.execmd.exehosts.execmd.exedescription pid process target process PID 1000 wrote to memory of 3620 1000 f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe REG.exe PID 1000 wrote to memory of 3620 1000 f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe REG.exe PID 1000 wrote to memory of 3620 1000 f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe REG.exe PID 1000 wrote to memory of 2608 1000 f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe avscan.exe PID 1000 wrote to memory of 2608 1000 f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe avscan.exe PID 1000 wrote to memory of 2608 1000 f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe avscan.exe PID 2608 wrote to memory of 1588 2608 avscan.exe avscan.exe PID 2608 wrote to memory of 1588 2608 avscan.exe avscan.exe PID 2608 wrote to memory of 1588 2608 avscan.exe avscan.exe PID 2608 wrote to memory of 2616 2608 avscan.exe cmd.exe PID 2608 wrote to memory of 2616 2608 avscan.exe cmd.exe PID 2608 wrote to memory of 2616 2608 avscan.exe cmd.exe PID 1000 wrote to memory of 2700 1000 f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe cmd.exe PID 1000 wrote to memory of 2700 1000 f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe cmd.exe PID 1000 wrote to memory of 2700 1000 f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe cmd.exe PID 2700 wrote to memory of 2976 2700 cmd.exe hosts.exe PID 2700 wrote to memory of 2976 2700 cmd.exe hosts.exe PID 2700 wrote to memory of 2976 2700 cmd.exe hosts.exe PID 2616 wrote to memory of 2112 2616 cmd.exe hosts.exe PID 2616 wrote to memory of 2112 2616 cmd.exe hosts.exe PID 2616 wrote to memory of 2112 2616 cmd.exe hosts.exe PID 2112 wrote to memory of 3920 2112 hosts.exe avscan.exe PID 2112 wrote to memory of 3920 2112 hosts.exe avscan.exe PID 2112 wrote to memory of 3920 2112 hosts.exe avscan.exe PID 2112 wrote to memory of 2648 2112 hosts.exe cmd.exe PID 2112 wrote to memory of 2648 2112 hosts.exe cmd.exe PID 2112 wrote to memory of 2648 2112 hosts.exe cmd.exe PID 2648 wrote to memory of 2384 2648 cmd.exe hosts.exe PID 2648 wrote to memory of 2384 2648 cmd.exe hosts.exe PID 2648 wrote to memory of 2384 2648 cmd.exe hosts.exe PID 2700 wrote to memory of 1164 2700 cmd.exe WScript.exe PID 2700 wrote to memory of 1164 2700 cmd.exe WScript.exe PID 2700 wrote to memory of 1164 2700 cmd.exe WScript.exe PID 2648 wrote to memory of 2020 2648 cmd.exe WScript.exe PID 2648 wrote to memory of 2020 2648 cmd.exe WScript.exe PID 2648 wrote to memory of 2020 2648 cmd.exe WScript.exe PID 2616 wrote to memory of 3000 2616 cmd.exe WScript.exe PID 2616 wrote to memory of 3000 2616 cmd.exe WScript.exe PID 2616 wrote to memory of 3000 2616 cmd.exe WScript.exe PID 2608 wrote to memory of 3028 2608 avscan.exe REG.exe PID 2608 wrote to memory of 3028 2608 avscan.exe REG.exe PID 2608 wrote to memory of 3028 2608 avscan.exe REG.exe PID 2112 wrote to memory of 3420 2112 hosts.exe REG.exe PID 2112 wrote to memory of 3420 2112 hosts.exe REG.exe PID 2112 wrote to memory of 3420 2112 hosts.exe REG.exe PID 2608 wrote to memory of 1348 2608 avscan.exe REG.exe PID 2608 wrote to memory of 1348 2608 avscan.exe REG.exe PID 2608 wrote to memory of 1348 2608 avscan.exe REG.exe PID 2112 wrote to memory of 2888 2112 hosts.exe REG.exe PID 2112 wrote to memory of 2888 2112 hosts.exe REG.exe PID 2112 wrote to memory of 2888 2112 hosts.exe REG.exe PID 2608 wrote to memory of 3856 2608 avscan.exe REG.exe PID 2608 wrote to memory of 3856 2608 avscan.exe REG.exe PID 2608 wrote to memory of 3856 2608 avscan.exe REG.exe PID 2112 wrote to memory of 64 2112 hosts.exe REG.exe PID 2112 wrote to memory of 64 2112 hosts.exe REG.exe PID 2112 wrote to memory of 64 2112 hosts.exe REG.exe PID 2608 wrote to memory of 2292 2608 avscan.exe REG.exe PID 2608 wrote to memory of 2292 2608 avscan.exe REG.exe PID 2608 wrote to memory of 2292 2608 avscan.exe REG.exe PID 2112 wrote to memory of 2644 2112 hosts.exe REG.exe PID 2112 wrote to memory of 2644 2112 hosts.exe REG.exe PID 2112 wrote to memory of 2644 2112 hosts.exe REG.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe"C:\Users\Admin\AppData\Local\Temp\f48a7dd16b186a612101118825d9149e5bdbdd73686c30a8fc05352a3e20bcb3.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f2⤵
- Modifies registry key
-
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\windows\hosts.exeC:\windows\hosts.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat5⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\windows\hosts.exeC:\windows\hosts.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"6⤵
- Adds policy Run key to start application
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f5⤵
- Modifies registry key
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"4⤵
- Adds policy Run key to start application
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\windows\W_X_C.bat2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\windows\hosts.exeC:\windows\hosts.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"3⤵
- Adds policy Run key to start application
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\avscan.exeMD5
4ae0047bdae14ccdde1a43907726d921
SHA1f8abf3c61e32fcddd678fadf37d47c69a2d2179e
SHA2569b25e63e883bd7d516e4a80c1ff63adf457a634ae03c43cfe97f93592cd37cbe
SHA512437d59224063d7ce683762d1d0e025163b109dc80561f8bb5612df2e69ecfe7f7ee339e254d088eed7ae3f15e896f52ea7f574f5697d7dfaf8f27810dfe7efbc
-
C:\Users\Admin\AppData\Local\Temp\avscan.exeMD5
4ae0047bdae14ccdde1a43907726d921
SHA1f8abf3c61e32fcddd678fadf37d47c69a2d2179e
SHA2569b25e63e883bd7d516e4a80c1ff63adf457a634ae03c43cfe97f93592cd37cbe
SHA512437d59224063d7ce683762d1d0e025163b109dc80561f8bb5612df2e69ecfe7f7ee339e254d088eed7ae3f15e896f52ea7f574f5697d7dfaf8f27810dfe7efbc
-
C:\Users\Admin\AppData\Local\Temp\avscan.exeMD5
4ae0047bdae14ccdde1a43907726d921
SHA1f8abf3c61e32fcddd678fadf37d47c69a2d2179e
SHA2569b25e63e883bd7d516e4a80c1ff63adf457a634ae03c43cfe97f93592cd37cbe
SHA512437d59224063d7ce683762d1d0e025163b109dc80561f8bb5612df2e69ecfe7f7ee339e254d088eed7ae3f15e896f52ea7f574f5697d7dfaf8f27810dfe7efbc
-
C:\Users\Admin\AppData\Local\Temp\avscan.exeMD5
4ae0047bdae14ccdde1a43907726d921
SHA1f8abf3c61e32fcddd678fadf37d47c69a2d2179e
SHA2569b25e63e883bd7d516e4a80c1ff63adf457a634ae03c43cfe97f93592cd37cbe
SHA512437d59224063d7ce683762d1d0e025163b109dc80561f8bb5612df2e69ecfe7f7ee339e254d088eed7ae3f15e896f52ea7f574f5697d7dfaf8f27810dfe7efbc
-
C:\Windows\W_X_C.vbsMD5
56f244ad0dfcdd0da2b8d260e2393116
SHA138f6054606babdcf6b802e5d142a4ea4a033cca3
SHA256604dc87b988ded73d2266948fadd4584a8bf8e9f3118bcb96e15b03f27f7179e
SHA512e52a2736aa7405df61aa8d473e3be06734dca45410f66666c687c25248b9789eb398d6e01bb4438a8219fbb771f2b86c009e6193f014d1b38d1b5250dc3b667c
-
C:\Windows\hosts.exeMD5
3856821090be5f490ff1efc886a6a5cb
SHA18e0e98d850d1d684c66ef7fab3c159f86eeb33b9
SHA256115e9757eae768c96b4c27ab610fa84fd78ad42095b587a778546e8e23fc1d7e
SHA512b0772e2c8c5f06ed3bd70eb703927e9d53d68bd0d6727eb1472301b8fe8602731d91ff9a93e0a1a3632aab8a2c818437ba5d1fa953603dcf1b20072a5041749e
-
C:\Windows\hosts.exeMD5
3856821090be5f490ff1efc886a6a5cb
SHA18e0e98d850d1d684c66ef7fab3c159f86eeb33b9
SHA256115e9757eae768c96b4c27ab610fa84fd78ad42095b587a778546e8e23fc1d7e
SHA512b0772e2c8c5f06ed3bd70eb703927e9d53d68bd0d6727eb1472301b8fe8602731d91ff9a93e0a1a3632aab8a2c818437ba5d1fa953603dcf1b20072a5041749e
-
C:\Windows\hosts.exeMD5
3856821090be5f490ff1efc886a6a5cb
SHA18e0e98d850d1d684c66ef7fab3c159f86eeb33b9
SHA256115e9757eae768c96b4c27ab610fa84fd78ad42095b587a778546e8e23fc1d7e
SHA512b0772e2c8c5f06ed3bd70eb703927e9d53d68bd0d6727eb1472301b8fe8602731d91ff9a93e0a1a3632aab8a2c818437ba5d1fa953603dcf1b20072a5041749e
-
C:\Windows\hosts.exeMD5
3856821090be5f490ff1efc886a6a5cb
SHA18e0e98d850d1d684c66ef7fab3c159f86eeb33b9
SHA256115e9757eae768c96b4c27ab610fa84fd78ad42095b587a778546e8e23fc1d7e
SHA512b0772e2c8c5f06ed3bd70eb703927e9d53d68bd0d6727eb1472301b8fe8602731d91ff9a93e0a1a3632aab8a2c818437ba5d1fa953603dcf1b20072a5041749e
-
C:\windows\hosts.exeMD5
3856821090be5f490ff1efc886a6a5cb
SHA18e0e98d850d1d684c66ef7fab3c159f86eeb33b9
SHA256115e9757eae768c96b4c27ab610fa84fd78ad42095b587a778546e8e23fc1d7e
SHA512b0772e2c8c5f06ed3bd70eb703927e9d53d68bd0d6727eb1472301b8fe8602731d91ff9a93e0a1a3632aab8a2c818437ba5d1fa953603dcf1b20072a5041749e
-
\??\c:\windows\W_X_C.batMD5
4db9f8b6175722b62ececeeeba1ce307
SHA13b3ba8414706e72a6fa19e884a97b87609e11e47
SHA256d2150b9e5a4ce55e140f0ca91c4e300715d42095c8fddf58c77037cdd2cfaf78
SHA5121d6dc274cf7a3dd704f840e6a5ad57ab4c4e35d5f09489aeff520bb797e1c825bac53fc335156fe41e767a46520d031855fe42fe7b175409ebe5e9e986fb9b8b
-
memory/64-185-0x0000000000000000-mapping.dmp
-
memory/1000-114-0x0000000000030000-0x0000000000034000-memory.dmpFilesize
16KB
-
memory/1000-115-0x0000000066000000-0x0000000066153000-memory.dmpFilesize
1.3MB
-
memory/1000-116-0x0000000000400000-0x0000000000425000-memory.dmpFilesize
148KB
-
memory/1000-119-0x0000000000401000-0x000000000041D000-memory.dmpFilesize
112KB
-
memory/1164-176-0x0000000000000000-mapping.dmp
-
memory/1348-182-0x0000000000000000-mapping.dmp
-
memory/1588-129-0x0000000000000000-mapping.dmp
-
memory/1588-131-0x0000000066000000-0x0000000066153000-memory.dmpFilesize
1.3MB
-
memory/2020-177-0x0000000000000000-mapping.dmp
-
memory/2112-147-0x0000000066000000-0x0000000066153000-memory.dmpFilesize
1.3MB
-
memory/2112-143-0x0000000000000000-mapping.dmp
-
memory/2292-186-0x0000000000000000-mapping.dmp
-
memory/2384-171-0x0000000066000000-0x0000000066153000-memory.dmpFilesize
1.3MB
-
memory/2384-168-0x0000000000000000-mapping.dmp
-
memory/2608-121-0x0000000000000000-mapping.dmp
-
memory/2608-124-0x0000000066000000-0x0000000066153000-memory.dmpFilesize
1.3MB
-
memory/2616-139-0x0000000000000000-mapping.dmp
-
memory/2644-187-0x0000000000000000-mapping.dmp
-
memory/2648-167-0x0000000000000000-mapping.dmp
-
memory/2700-140-0x0000000000000000-mapping.dmp
-
memory/2888-183-0x0000000000000000-mapping.dmp
-
memory/2976-148-0x0000000066000000-0x0000000066153000-memory.dmpFilesize
1.3MB
-
memory/2976-142-0x0000000000000000-mapping.dmp
-
memory/3000-175-0x0000000000000000-mapping.dmp
-
memory/3028-180-0x0000000000000000-mapping.dmp
-
memory/3420-181-0x0000000000000000-mapping.dmp
-
memory/3620-120-0x0000000000000000-mapping.dmp
-
memory/3856-184-0x0000000000000000-mapping.dmp
-
memory/3920-157-0x0000000066000000-0x0000000066153000-memory.dmpFilesize
1.3MB
-
memory/3920-155-0x0000000000000000-mapping.dmp