Analysis
-
max time kernel
1798s -
max time network
1832s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
19-08-2021 14:54
Static task
static1
Behavioral task
behavioral1
Sample
referenceSet.jpg.dll
Resource
win7v20210410
General
-
Target
referenceSet.jpg.dll
-
Size
594KB
-
MD5
fbbc24f5345b11b35b8f0b68c9d30caa
-
SHA1
13a5fd90f3dbc9797a59cf924aa7c6bdc35cacdf
-
SHA256
bcdac7b40846874f002e6f59413a381e4ae13bf7181eae60203c0ae69f799a57
-
SHA512
6f05c0d78a7e01e8659410c513a7852709d53db36d885c3a4a32bf8e089cc7cbeab0d129cf669991c779a488ffa515ea2d0ebe49ca03e7881d36ebbc09b13faa
Malware Config
Extracted
trickbot
2000031
zev1
14.232.161.45:443
118.173.233.64:443
41.57.156.203:443
45.239.234.2:443
45.201.136.3:443
177.10.90.29:443
185.17.105.236:443
91.237.161.87:443
185.189.55.207:443
186.225.119.170:443
143.0.208.20:443
222.124.16.74:443
220.82.64.198:443
200.236.218.62:443
178.216.28.59:443
45.239.233.131:443
196.216.59.174:443
119.202.8.249:443
82.159.149.37:443
49.248.217.170:443
181.114.215.239:443
113.160.132.237:443
105.30.26.50:443
202.165.47.106:443
103.122.228.44:443
-
autorunName:pwgrabbName:pwgrabc
Extracted
trickbot
2000032
tot141
103.122.228.44:443
196.216.220.211:443
181.114.215.239:443
41.57.156.203:443
43.252.159.63:443
197.156.129.250:443
113.160.37.196:443
38.110.100.64:443
113.160.132.237:443
24.28.12.23:443
38.110.100.219:443
45.239.233.109:443
119.202.8.249:443
200.236.218.62:443
220.82.64.198:443
190.93.208.53:443
196.216.59.174:443
222.124.16.74:443
202.165.47.106:443
96.9.77.56:443
49.248.217.170:443
186.225.119.170:443
-
autorunName:pwgrabbName:pwgrabc
Signatures
-
suricata: ET MALWARE Trickbot Checkin Response
suricata: ET MALWARE Trickbot Checkin Response
-
Blocklisted process makes network request 25 IoCs
Processes:
cmd.execmd.execmd.exeflow pid process 65 1264 cmd.exe 68 1264 cmd.exe 73 612 cmd.exe 74 2024 cmd.exe 75 612 cmd.exe 76 612 cmd.exe 77 612 cmd.exe 78 612 cmd.exe 81 612 cmd.exe 82 612 cmd.exe 83 612 cmd.exe 84 612 cmd.exe 85 612 cmd.exe 86 612 cmd.exe 87 612 cmd.exe 88 612 cmd.exe 91 612 cmd.exe 92 612 cmd.exe 93 612 cmd.exe 96 612 cmd.exe 99 612 cmd.exe 102 612 cmd.exe 103 612 cmd.exe 106 612 cmd.exe 107 612 cmd.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exepid process 2840 u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exe -
Drops startup file 2 IoCs
Processes:
nin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exedescription ioc process File created C:\Users\Admin\appdata\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.LNK nin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exe File created C:\Users\Default\appdata\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.LNK nin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exe -
Loads dropped DLL 4 IoCs
Processes:
nin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exepid process 2832 nin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exe 2832 nin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exe 2832 nin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exe 2832 nin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
nin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run nin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0 = "C:\\Users\\Admin\\appdata\\roaming\\u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exe" nin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 13 ipinfo.io -
Drops file in System32 directory 4 IoCs
Processes:
wermgr.exenin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exedescription ioc process File created C:\Windows\system32\cn\mqogklasg.txt wermgr.exe File created C:\WINDOWS\SysWOW64\u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exe nin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exe File opened for modification C:\WINDOWS\SysWOW64\u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exe nin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exe File created C:\WINDOWS\SysWOW64\TASKS\u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exe nin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exe -
Drops file in Windows directory 1 IoCs
Processes:
nin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exedescription ioc process File opened for modification C:\WINDOWS\nin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exe nin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exe -
Discovers systems in the same network 1 TTPs 2 IoCs
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 544 ipconfig.exe -
Modifies data under HKEY_USERS 4 IoCs
Processes:
u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Sasha's Apps\RegistryDemo\v1.0 u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exe Key created \REGISTRY\USER\.DEFAULT\Software u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sasha's Apps u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exe Key created \REGISTRY\USER\.DEFAULT\Software\Sasha's Apps\RegistryDemo u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
cmd.execmd.execmd.execmd.execmd.execmd.execmd.exepid process 1532 cmd.exe 1780 cmd.exe 1264 cmd.exe 1780 cmd.exe 932 cmd.exe 612 cmd.exe 1276 cmd.exe 2992 cmd.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
wermgr.execmd.execmd.execmd.execmd.execmd.execmd.exewermgr.exedescription pid process Token: SeDebugPrivilege 1500 wermgr.exe Token: SeDebugPrivilege 1532 cmd.exe Token: SeDebugPrivilege 1780 cmd.exe Token: SeDebugPrivilege 932 cmd.exe Token: SeDebugPrivilege 612 cmd.exe Token: SeDebugPrivilege 1276 cmd.exe Token: SeDebugPrivilege 2992 cmd.exe Token: SeDebugPrivilege 2908 wermgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exepid process 2840 u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exe 2840 u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exeregsvr32.exewermgr.exedescription pid process target process PID 1640 wrote to memory of 2024 1640 regsvr32.exe regsvr32.exe PID 1640 wrote to memory of 2024 1640 regsvr32.exe regsvr32.exe PID 1640 wrote to memory of 2024 1640 regsvr32.exe regsvr32.exe PID 1640 wrote to memory of 2024 1640 regsvr32.exe regsvr32.exe PID 1640 wrote to memory of 2024 1640 regsvr32.exe regsvr32.exe PID 1640 wrote to memory of 2024 1640 regsvr32.exe regsvr32.exe PID 1640 wrote to memory of 2024 1640 regsvr32.exe regsvr32.exe PID 2024 wrote to memory of 1500 2024 regsvr32.exe wermgr.exe PID 2024 wrote to memory of 1500 2024 regsvr32.exe wermgr.exe PID 2024 wrote to memory of 1500 2024 regsvr32.exe wermgr.exe PID 2024 wrote to memory of 1500 2024 regsvr32.exe wermgr.exe PID 2024 wrote to memory of 1500 2024 regsvr32.exe wermgr.exe PID 2024 wrote to memory of 1500 2024 regsvr32.exe wermgr.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe PID 1500 wrote to memory of 1532 1500 wermgr.exe cmd.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\referenceSet.jpg.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\referenceSet.jpg.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\cmd.exe/c ipconfig /all5⤵
-
C:\Windows\system32\ipconfig.exeipconfig /all6⤵
- Gathers network information
-
C:\Windows\system32\cmd.exe/c net config workstation5⤵
-
C:\Windows\system32\net.exenet config workstation6⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 config workstation7⤵
-
C:\Windows\system32\cmd.exe/c net view /all5⤵
-
C:\Windows\system32\net.exenet view /all6⤵
- Discovers systems in the same network
-
C:\Windows\system32\cmd.exe/c net view /all /domain5⤵
-
C:\Windows\system32\net.exenet view /all /domain6⤵
- Discovers systems in the same network
-
C:\Windows\system32\cmd.exe/c nltest /domain_trusts5⤵
-
C:\Windows\system32\nltest.exenltest /domain_trusts6⤵
-
C:\Windows\system32\cmd.exe/c nltest /domain_trusts /all_trusts5⤵
-
C:\Windows\system32\nltest.exenltest /domain_trusts /all_trusts6⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe4⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe4⤵
- Blocklisted process makes network request
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\WINDOWS\nin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exeC:\WINDOWS\nin2xfwtlhfqkg4l38fs827356zhyeoarsbr35dhvmeywchcfma3ti86pqb1ydhg.exe C:\WINDOWS\u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exe1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
-
C:\WINDOWS\SysWOW64\u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exe-start2⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exeMD5
3dc65cac02fbe7c410007782ea678a77
SHA1180f195d6372535785df1208172ef2e2e19ce548
SHA2566b4872768da17a3ac4dab0de7757e5af9fce9e5371e365b67a44e27e5f9ea6ee
SHA512c49073592eb5e6195f9b6656c02a194df156edbaf4abfab8d923a269a3a2396f1453f9772d55082f92c81d0f15dbc44c736be023ebc3aa4c4b033d4de09a575a
-
\Users\Admin\AppData\Roaming\u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exeMD5
3dc65cac02fbe7c410007782ea678a77
SHA1180f195d6372535785df1208172ef2e2e19ce548
SHA2566b4872768da17a3ac4dab0de7757e5af9fce9e5371e365b67a44e27e5f9ea6ee
SHA512c49073592eb5e6195f9b6656c02a194df156edbaf4abfab8d923a269a3a2396f1453f9772d55082f92c81d0f15dbc44c736be023ebc3aa4c4b033d4de09a575a
-
\Users\Default\AppData\Roaming\u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exeMD5
3dc65cac02fbe7c410007782ea678a77
SHA1180f195d6372535785df1208172ef2e2e19ce548
SHA2566b4872768da17a3ac4dab0de7757e5af9fce9e5371e365b67a44e27e5f9ea6ee
SHA512c49073592eb5e6195f9b6656c02a194df156edbaf4abfab8d923a269a3a2396f1453f9772d55082f92c81d0f15dbc44c736be023ebc3aa4c4b033d4de09a575a
-
\Windows\SysWOW64\u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exeMD5
3dc65cac02fbe7c410007782ea678a77
SHA1180f195d6372535785df1208172ef2e2e19ce548
SHA2566b4872768da17a3ac4dab0de7757e5af9fce9e5371e365b67a44e27e5f9ea6ee
SHA512c49073592eb5e6195f9b6656c02a194df156edbaf4abfab8d923a269a3a2396f1453f9772d55082f92c81d0f15dbc44c736be023ebc3aa4c4b033d4de09a575a
-
\Windows\SysWOW64\u9wctcni38jt4blyvssjeu0kjb6l3tp8nzlo7tu7jr02mn8mllsxlzcfgmbfowc0.exeMD5
3dc65cac02fbe7c410007782ea678a77
SHA1180f195d6372535785df1208172ef2e2e19ce548
SHA2566b4872768da17a3ac4dab0de7757e5af9fce9e5371e365b67a44e27e5f9ea6ee
SHA512c49073592eb5e6195f9b6656c02a194df156edbaf4abfab8d923a269a3a2396f1453f9772d55082f92c81d0f15dbc44c736be023ebc3aa4c4b033d4de09a575a
-
memory/284-98-0x0000000000000000-mapping.dmp
-
memory/544-87-0x0000000000000000-mapping.dmp
-
memory/584-95-0x0000000000000000-mapping.dmp
-
memory/612-107-0x0000000000000000-mapping.dmp
-
memory/684-91-0x0000000000000000-mapping.dmp
-
memory/932-103-0x0000000000000000-mapping.dmp
-
memory/960-93-0x0000000000000000-mapping.dmp
-
memory/1012-94-0x0000000000000000-mapping.dmp
-
memory/1052-92-0x0000000000000000-mapping.dmp
-
memory/1096-88-0x0000000000000000-mapping.dmp
-
memory/1264-83-0x0000000180000000-0x0000000180009000-memory.dmpFilesize
36KB
-
memory/1264-82-0x0000000000000000-mapping.dmp
-
memory/1276-115-0x0000000000000000-mapping.dmp
-
memory/1280-99-0x0000000000000000-mapping.dmp
-
memory/1372-86-0x0000000000000000-mapping.dmp
-
memory/1500-72-0x0000000000290000-0x0000000000291000-memory.dmpFilesize
4KB
-
memory/1500-71-0x00000000000F0000-0x0000000000118000-memory.dmpFilesize
160KB
-
memory/1500-70-0x0000000000000000-mapping.dmp
-
memory/1532-77-0x0000000000060000-0x0000000000061000-memory.dmpFilesize
4KB
-
memory/1532-73-0x0000000000000000-mapping.dmp
-
memory/1640-60-0x000007FEFBAB1000-0x000007FEFBAB3000-memory.dmpFilesize
8KB
-
memory/1660-90-0x0000000000000000-mapping.dmp
-
memory/1732-96-0x0000000000000000-mapping.dmp
-
memory/1780-78-0x0000000000000000-mapping.dmp
-
memory/1784-89-0x0000000000000000-mapping.dmp
-
memory/1852-97-0x0000000000000000-mapping.dmp
-
memory/2024-101-0x0000000000000000-mapping.dmp
-
memory/2024-69-0x0000000000511000-0x0000000000513000-memory.dmpFilesize
8KB
-
memory/2024-68-0x0000000000A30000-0x0000000000A41000-memory.dmpFilesize
68KB
-
memory/2024-67-0x0000000001FB0000-0x0000000001FF3000-memory.dmpFilesize
268KB
-
memory/2024-66-0x0000000000250000-0x00000000002D0000-memory.dmpFilesize
512KB
-
memory/2024-62-0x0000000075411000-0x0000000075413000-memory.dmpFilesize
8KB
-
memory/2024-63-0x0000000001F70000-0x0000000001FA7000-memory.dmpFilesize
220KB
-
memory/2024-61-0x0000000000000000-mapping.dmp
-
memory/2840-121-0x0000000000000000-mapping.dmp
-
memory/2840-124-0x0000000000AE0000-0x0000000000B20000-memory.dmpFilesize
256KB
-
memory/2840-130-0x0000000000350000-0x000000000038D000-memory.dmpFilesize
244KB
-
memory/2840-131-0x0000000000B90000-0x0000000000BCB000-memory.dmpFilesize
236KB
-
memory/2840-132-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/2840-133-0x0000000010001000-0x0000000010003000-memory.dmpFilesize
8KB
-
memory/2908-138-0x0000000000000000-mapping.dmp
-
memory/2908-139-0x0000000000060000-0x0000000000089000-memory.dmpFilesize
164KB
-
memory/2908-140-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/2992-134-0x0000000000000000-mapping.dmp