Overview
overview
10Static
static
10keygen-step-1.exe
windows11_x64
10keygen-step-1.exe
windows10_x64
10keygen-step-1.exe
windows10_x64
10keygen-step-3.exe
windows11_x64
10keygen-step-3.exe
windows10_x64
8keygen-step-3.exe
windows10_x64
8keygen-ste...ck.exe
windows11_x64
10keygen-ste...ck.exe
windows10_x64
10keygen-ste...ck.exe
windows10_x64
10keygen-ste...28.exe
windows11_x64
10keygen-ste...28.exe
windows10_x64
10keygen-ste...28.exe
windows10_x64
10keygen-ste...up.exe
windows11_x64
10keygen-ste...up.exe
windows10_x64
10keygen-ste...up.exe
windows10_x64
10keygen-ste...5f.exe
windows11_x64
10keygen-ste...5f.exe
windows10_x64
keygen-ste...5f.exe
windows10_x64
10keygen-ste...af.exe
windows11_x64
7keygen-ste...af.exe
windows10_x64
7keygen-ste...af.exe
windows10_x64
7keygen-step-4/ss.exe
windows11_x64
10keygen-step-4/ss.exe
windows10_x64
9keygen-step-4/ss.exe
windows10_x64
9keygen-step-6.exe
windows11_x64
6keygen-step-6.exe
windows10_x64
6keygen-step-6.exe
windows10_x64
6keygen.bat
windows11_x64
10keygen.bat
windows10_x64
10keygen.bat
windows10_x64
10Analysis
-
max time kernel
457s -
max time network
1609s -
platform
windows11_x64 -
resource
win11 -
submitted
07-09-2021 18:08
Static task
static1
Behavioral task
behavioral1
Sample
keygen-step-1.exe
Resource
win11
Behavioral task
behavioral2
Sample
keygen-step-1.exe
Resource
win10v20210408
Behavioral task
behavioral3
Sample
keygen-step-1.exe
Resource
win10-en
Behavioral task
behavioral4
Sample
keygen-step-3.exe
Resource
win11
Behavioral task
behavioral5
Sample
keygen-step-3.exe
Resource
win10v20210408
Behavioral task
behavioral6
Sample
keygen-step-3.exe
Resource
win10-en
Behavioral task
behavioral7
Sample
keygen-step-4/Crack.exe
Resource
win11
Behavioral task
behavioral8
Sample
keygen-step-4/Crack.exe
Resource
win10v20210408
Behavioral task
behavioral9
Sample
keygen-step-4/Crack.exe
Resource
win10-en
Behavioral task
behavioral10
Sample
keygen-step-4/PBrowFile28.exe
Resource
win11
Behavioral task
behavioral11
Sample
keygen-step-4/PBrowFile28.exe
Resource
win10v20210408
Behavioral task
behavioral12
Sample
keygen-step-4/PBrowFile28.exe
Resource
win10-en
Behavioral task
behavioral13
Sample
keygen-step-4/Setup.exe
Resource
win11
Behavioral task
behavioral14
Sample
keygen-step-4/Setup.exe
Resource
win10v20210408
Behavioral task
behavioral15
Sample
keygen-step-4/Setup.exe
Resource
win10-en
Behavioral task
behavioral16
Sample
keygen-step-4/f2217e5f.exe
Resource
win11
Behavioral task
behavioral17
Sample
keygen-step-4/f2217e5f.exe
Resource
win10v20210408
Behavioral task
behavioral18
Sample
keygen-step-4/f2217e5f.exe
Resource
win10-en
Behavioral task
behavioral19
Sample
keygen-step-4/md1_1eaf.exe
Resource
win11
Behavioral task
behavioral20
Sample
keygen-step-4/md1_1eaf.exe
Resource
win10v20210408
Behavioral task
behavioral21
Sample
keygen-step-4/md1_1eaf.exe
Resource
win10-en
Behavioral task
behavioral22
Sample
keygen-step-4/ss.exe
Resource
win11
Behavioral task
behavioral23
Sample
keygen-step-4/ss.exe
Resource
win10v20210408
Behavioral task
behavioral24
Sample
keygen-step-4/ss.exe
Resource
win10-en
Behavioral task
behavioral25
Sample
keygen-step-6.exe
Resource
win11
Behavioral task
behavioral26
Sample
keygen-step-6.exe
Resource
win10v20210408
Behavioral task
behavioral27
Sample
keygen-step-6.exe
Resource
win10-en
Behavioral task
behavioral28
Sample
keygen.bat
Resource
win11
Behavioral task
behavioral29
Sample
keygen.bat
Resource
win10v20210408
Behavioral task
behavioral30
Sample
keygen.bat
Resource
win10-en
General
-
Target
keygen-step-4/ss.exe
-
Size
100KB
-
MD5
9a6071c1a67be3fb247f857fe5903bbf
-
SHA1
4a2e14763c51537e8695014007eceaf391a3f600
-
SHA256
01a9cb71df1d038bbec243ec7f2c1dd12d65a735297469c7f72be80886842e3c
-
SHA512
c862ed8670b48e23b081e1c91280599ffdd963e714665b80553b41540cb3584c823a25f05c75e47eaea1473c687a9ef7c9a219d724d059e5bd77ac6d127f5e68
Malware Config
Signatures
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 860 created 3640 860 WerFault.exe 1545230.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 4 IoCs
Processes:
1545230.exe769103.exe1982354.exeWinHoster.exepid process 3640 1545230.exe 4148 769103.exe 4620 1982354.exe 1928 WinHoster.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
1982354.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1982354.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1982354.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\ProgramData\1982354.exe themida C:\ProgramData\1982354.exe themida behavioral22/memory/4620-176-0x0000000000860000-0x0000000000861000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
769103.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-257790753-2419383948-818201544-1000\Software\Microsoft\Windows\CurrentVersion\Run\WinHost = "C:\\Users\\Admin\\AppData\\Roaming\\WinHost\\WinHoster.exe" 769103.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
1982354.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1982354.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
1982354.exepid process 4620 1982354.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3564 3640 WerFault.exe 1545230.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
WerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision WerFault.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
WerFault.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe -
Modifies data under HKEY_USERS 43 IoCs
Processes:
sihclient.exesvchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
1545230.exeWerFault.exe1982354.exepid process 3640 1545230.exe 3640 1545230.exe 3564 WerFault.exe 3564 WerFault.exe 4620 1982354.exe 4620 1982354.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
ss.exe1545230.exe1982354.exedescription pid process Token: SeDebugPrivilege 4852 ss.exe Token: SeDebugPrivilege 3640 1545230.exe Token: SeDebugPrivilege 4620 1982354.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
ss.exe769103.exeWerFault.exedescription pid process target process PID 4852 wrote to memory of 3640 4852 ss.exe 1545230.exe PID 4852 wrote to memory of 3640 4852 ss.exe 1545230.exe PID 4852 wrote to memory of 4148 4852 ss.exe 769103.exe PID 4852 wrote to memory of 4148 4852 ss.exe 769103.exe PID 4852 wrote to memory of 4148 4852 ss.exe 769103.exe PID 4852 wrote to memory of 4620 4852 ss.exe 1982354.exe PID 4852 wrote to memory of 4620 4852 ss.exe 1982354.exe PID 4852 wrote to memory of 4620 4852 ss.exe 1982354.exe PID 4148 wrote to memory of 1928 4148 769103.exe WinHoster.exe PID 4148 wrote to memory of 1928 4148 769103.exe WinHoster.exe PID 4148 wrote to memory of 1928 4148 769103.exe WinHoster.exe PID 860 wrote to memory of 3640 860 WerFault.exe 1545230.exe PID 860 wrote to memory of 3640 860 WerFault.exe 1545230.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\keygen-step-4\ss.exe"C:\Users\Admin\AppData\Local\Temp\keygen-step-4\ss.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\ProgramData\1545230.exe"C:\ProgramData\1545230.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3640 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3640 -s 22963⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:3564 -
C:\ProgramData\769103.exe"C:\ProgramData\769103.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"3⤵
- Executes dropped EXE
PID:1928 -
C:\ProgramData\1982354.exe"C:\ProgramData\1982354.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv dn8LwwbFRkCXo9mq/8woaw.0.21⤵
- Modifies data under HKEY_USERS
PID:4856
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 448 -p 3640 -ip 36401⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:860
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:696
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:1176
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\1545230.exeMD5
6452958f87d648cf539894e38e360832
SHA139e3b6b452edaaddeb2d76949e970794221f790e
SHA2568798d0b92a795f695ccd661417d824bf5044dcfc948e9c1ccee5b345bbbcb074
SHA5126d3788447dba7002a29784de66f37b9a913d3eb06955bdf6478c8866c7cc5cad45e8ab911a82801cc069de4e856e4c34ca3581a6e48f7287cf6a0419d5e99350
-
C:\ProgramData\1545230.exeMD5
6452958f87d648cf539894e38e360832
SHA139e3b6b452edaaddeb2d76949e970794221f790e
SHA2568798d0b92a795f695ccd661417d824bf5044dcfc948e9c1ccee5b345bbbcb074
SHA5126d3788447dba7002a29784de66f37b9a913d3eb06955bdf6478c8866c7cc5cad45e8ab911a82801cc069de4e856e4c34ca3581a6e48f7287cf6a0419d5e99350
-
C:\ProgramData\1982354.exeMD5
e443b3cad80895e17ec69b07afe14297
SHA1193afa9c566dd40a62504e20d96f6f710eca6cf9
SHA256358ad170b159e399c0086fce075d56abe680835b60e6c4c2e2ecc4e0caf1fa65
SHA512d3391a01768b5651703c51ef3c6f73c822735a2b00c125f15316c428f7ea9079e14f00eb5c23ded937be64bb4283f24c0f0ff6d1cef2a8ad5016725c5016a0e9
-
C:\ProgramData\1982354.exeMD5
e443b3cad80895e17ec69b07afe14297
SHA1193afa9c566dd40a62504e20d96f6f710eca6cf9
SHA256358ad170b159e399c0086fce075d56abe680835b60e6c4c2e2ecc4e0caf1fa65
SHA512d3391a01768b5651703c51ef3c6f73c822735a2b00c125f15316c428f7ea9079e14f00eb5c23ded937be64bb4283f24c0f0ff6d1cef2a8ad5016725c5016a0e9
-
C:\ProgramData\769103.exeMD5
b9295c5e9138ccf15d67771f3726c778
SHA140cd9d94e9913a52877f09f340a5c2604030409c
SHA2568c4a2330010cdb34faf9f565943736d0bb9d21eb96a67ccc20c246cfe13e6292
SHA5124e1d7e74be77d151b79024db20f3427c53ddf0557bbccd71b93750514462b5d2d2130948c668b05e66cf4098a56ad34c75ec7d1bd2e21e1c0bda01f7f4345f08
-
C:\ProgramData\769103.exeMD5
b9295c5e9138ccf15d67771f3726c778
SHA140cd9d94e9913a52877f09f340a5c2604030409c
SHA2568c4a2330010cdb34faf9f565943736d0bb9d21eb96a67ccc20c246cfe13e6292
SHA5124e1d7e74be77d151b79024db20f3427c53ddf0557bbccd71b93750514462b5d2d2130948c668b05e66cf4098a56ad34c75ec7d1bd2e21e1c0bda01f7f4345f08
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exeMD5
b9295c5e9138ccf15d67771f3726c778
SHA140cd9d94e9913a52877f09f340a5c2604030409c
SHA2568c4a2330010cdb34faf9f565943736d0bb9d21eb96a67ccc20c246cfe13e6292
SHA5124e1d7e74be77d151b79024db20f3427c53ddf0557bbccd71b93750514462b5d2d2130948c668b05e66cf4098a56ad34c75ec7d1bd2e21e1c0bda01f7f4345f08
-
C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exeMD5
b9295c5e9138ccf15d67771f3726c778
SHA140cd9d94e9913a52877f09f340a5c2604030409c
SHA2568c4a2330010cdb34faf9f565943736d0bb9d21eb96a67ccc20c246cfe13e6292
SHA5124e1d7e74be77d151b79024db20f3427c53ddf0557bbccd71b93750514462b5d2d2130948c668b05e66cf4098a56ad34c75ec7d1bd2e21e1c0bda01f7f4345f08
-
memory/696-213-0x000001FACD140000-0x000001FACD141000-memory.dmpFilesize
4KB
-
memory/696-209-0x000001FACA860000-0x000001FACA870000-memory.dmpFilesize
64KB
-
memory/696-215-0x000001FACCEB0000-0x000001FACCEB1000-memory.dmpFilesize
4KB
-
memory/696-217-0x000001FACAB90000-0x000001FACAB91000-memory.dmpFilesize
4KB
-
memory/696-216-0x000001FACCEB0000-0x000001FACCEB4000-memory.dmpFilesize
16KB
-
memory/696-214-0x000001FACCEC0000-0x000001FACCEC4000-memory.dmpFilesize
16KB
-
memory/696-210-0x000001FACA8E0000-0x000001FACA8F0000-memory.dmpFilesize
64KB
-
memory/696-212-0x000001FACD180000-0x000001FACD184000-memory.dmpFilesize
16KB
-
memory/1928-200-0x0000000005630000-0x0000000005631000-memory.dmpFilesize
4KB
-
memory/1928-179-0x0000000000000000-mapping.dmp
-
memory/1928-198-0x0000000005E20000-0x0000000005E21000-memory.dmpFilesize
4KB
-
memory/3640-167-0x000000001C130000-0x000000001C131000-memory.dmpFilesize
4KB
-
memory/3640-166-0x000000001B490000-0x000000001B492000-memory.dmpFilesize
8KB
-
memory/3640-169-0x000000001C830000-0x000000001C831000-memory.dmpFilesize
4KB
-
memory/3640-157-0x0000000000FE0000-0x0000000000FE1000-memory.dmpFilesize
4KB
-
memory/3640-160-0x0000000001100000-0x0000000001101000-memory.dmpFilesize
4KB
-
memory/3640-152-0x00000000007F0000-0x00000000007F1000-memory.dmpFilesize
4KB
-
memory/3640-174-0x000000001C010000-0x000000001C011000-memory.dmpFilesize
4KB
-
memory/3640-149-0x0000000000000000-mapping.dmp
-
memory/3640-159-0x00000000029D0000-0x0000000002A1B000-memory.dmpFilesize
300KB
-
memory/4148-161-0x0000000000F10000-0x0000000000F11000-memory.dmpFilesize
4KB
-
memory/4148-172-0x0000000003310000-0x0000000003311000-memory.dmpFilesize
4KB
-
memory/4148-154-0x0000000000000000-mapping.dmp
-
memory/4148-163-0x00000000058F0000-0x00000000058F1000-memory.dmpFilesize
4KB
-
memory/4148-164-0x0000000003280000-0x000000000328C000-memory.dmpFilesize
48KB
-
memory/4148-165-0x000000000A4D0000-0x000000000A4D1000-memory.dmpFilesize
4KB
-
memory/4148-168-0x0000000005B00000-0x0000000005B01000-memory.dmpFilesize
4KB
-
memory/4620-191-0x00000000069D0000-0x00000000069D1000-memory.dmpFilesize
4KB
-
memory/4620-206-0x00000000080F0000-0x00000000080F1000-memory.dmpFilesize
4KB
-
memory/4620-197-0x0000000005F00000-0x0000000005F01000-memory.dmpFilesize
4KB
-
memory/4620-178-0x0000000006120000-0x0000000006121000-memory.dmpFilesize
4KB
-
memory/4620-199-0x0000000005B00000-0x0000000006118000-memory.dmpFilesize
6.1MB
-
memory/4620-170-0x0000000000000000-mapping.dmp
-
memory/4620-201-0x0000000007B00000-0x0000000007B01000-memory.dmpFilesize
4KB
-
memory/4620-202-0x0000000008200000-0x0000000008201000-memory.dmpFilesize
4KB
-
memory/4620-203-0x0000000007CD0000-0x0000000007CD1000-memory.dmpFilesize
4KB
-
memory/4620-194-0x0000000005E90000-0x0000000005E91000-memory.dmpFilesize
4KB
-
memory/4620-207-0x0000000008730000-0x0000000008731000-memory.dmpFilesize
4KB
-
memory/4620-208-0x00000000088F0000-0x00000000088F1000-memory.dmpFilesize
4KB
-
memory/4620-188-0x0000000005BB0000-0x0000000005BB1000-memory.dmpFilesize
4KB
-
memory/4620-186-0x0000000005D90000-0x0000000005D91000-memory.dmpFilesize
4KB
-
memory/4620-184-0x0000000005C80000-0x0000000005C81000-memory.dmpFilesize
4KB
-
memory/4620-182-0x0000000005B50000-0x0000000005B51000-memory.dmpFilesize
4KB
-
memory/4620-176-0x0000000000860000-0x0000000000861000-memory.dmpFilesize
4KB
-
memory/4852-158-0x00000000024E0000-0x00000000024E2000-memory.dmpFilesize
8KB
-
memory/4852-146-0x0000000000330000-0x0000000000331000-memory.dmpFilesize
4KB
-
memory/4852-148-0x0000000000BF0000-0x0000000000C05000-memory.dmpFilesize
84KB