Analysis
-
max time kernel
136s -
max time network
103s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
28-09-2021 09:56
Static task
static1
Behavioral task
behavioral1
Sample
VESSEL PARTICULARS - NYK LINE.doc.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
VESSEL PARTICULARS - NYK LINE.doc.exe
Resource
win10v20210408
General
-
Target
VESSEL PARTICULARS - NYK LINE.doc.exe
-
Size
384KB
-
MD5
93445df2c96362810e0395c5c867700e
-
SHA1
645f936406b04fbfb737bbffb5678d5255c6ec34
-
SHA256
ecb4fe719a7fc1365d70ec9db8b3c74cb4bf8968324c25d3817fcc5628fae6fa
-
SHA512
bfcfc7c220963f8269537b737d71251dfe3a9f6a800e7d65e3a1fd449a4f3f9e12c7f20207543009f8655a4fdfa672a11173de27e682478da4f15a0875f3bae8
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.boydsteamships.com - Port:
587 - Username:
csanchez@boydsteamships.com - Password:
co*tNjEBt4
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3160-515-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral2/memory/3160-516-0x0000000000436ABE-mapping.dmp family_agenttesla -
Nirsoft 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe Nirsoft -
Executes dropped EXE 4 IoCs
Processes:
AdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exepid process 3180 AdvancedRun.exe 3836 AdvancedRun.exe 2600 AdvancedRun.exe 2340 AdvancedRun.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
VESSEL PARTICULARS - NYK LINE.doc.exedescription pid process target process PID 740 set thread context of 3160 740 VESSEL PARTICULARS - NYK LINE.doc.exe VESSEL PARTICULARS - NYK LINE.doc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeAdvancedRun.exeVESSEL PARTICULARS - NYK LINE.doc.exeVESSEL PARTICULARS - NYK LINE.doc.exepid process 1168 powershell.exe 1292 powershell.exe 1188 powershell.exe 1168 powershell.exe 1292 powershell.exe 1188 powershell.exe 1168 powershell.exe 1188 powershell.exe 1292 powershell.exe 3840 powershell.exe 3840 powershell.exe 3840 powershell.exe 3180 AdvancedRun.exe 3180 AdvancedRun.exe 3180 AdvancedRun.exe 3180 AdvancedRun.exe 3836 AdvancedRun.exe 3836 AdvancedRun.exe 3836 AdvancedRun.exe 3836 AdvancedRun.exe 2600 AdvancedRun.exe 2600 AdvancedRun.exe 2600 AdvancedRun.exe 2600 AdvancedRun.exe 2340 AdvancedRun.exe 2340 AdvancedRun.exe 2340 AdvancedRun.exe 2340 AdvancedRun.exe 740 VESSEL PARTICULARS - NYK LINE.doc.exe 740 VESSEL PARTICULARS - NYK LINE.doc.exe 740 VESSEL PARTICULARS - NYK LINE.doc.exe 740 VESSEL PARTICULARS - NYK LINE.doc.exe 740 VESSEL PARTICULARS - NYK LINE.doc.exe 740 VESSEL PARTICULARS - NYK LINE.doc.exe 740 VESSEL PARTICULARS - NYK LINE.doc.exe 740 VESSEL PARTICULARS - NYK LINE.doc.exe 740 VESSEL PARTICULARS - NYK LINE.doc.exe 740 VESSEL PARTICULARS - NYK LINE.doc.exe 3160 VESSEL PARTICULARS - NYK LINE.doc.exe 3160 VESSEL PARTICULARS - NYK LINE.doc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1168 powershell.exe Token: SeDebugPrivilege 1292 powershell.exe Token: SeDebugPrivilege 1188 powershell.exe Token: SeIncreaseQuotaPrivilege 1292 powershell.exe Token: SeSecurityPrivilege 1292 powershell.exe Token: SeTakeOwnershipPrivilege 1292 powershell.exe Token: SeLoadDriverPrivilege 1292 powershell.exe Token: SeSystemProfilePrivilege 1292 powershell.exe Token: SeSystemtimePrivilege 1292 powershell.exe Token: SeProfSingleProcessPrivilege 1292 powershell.exe Token: SeIncBasePriorityPrivilege 1292 powershell.exe Token: SeCreatePagefilePrivilege 1292 powershell.exe Token: SeBackupPrivilege 1292 powershell.exe Token: SeRestorePrivilege 1292 powershell.exe Token: SeShutdownPrivilege 1292 powershell.exe Token: SeDebugPrivilege 1292 powershell.exe Token: SeSystemEnvironmentPrivilege 1292 powershell.exe Token: SeRemoteShutdownPrivilege 1292 powershell.exe Token: SeUndockPrivilege 1292 powershell.exe Token: SeManageVolumePrivilege 1292 powershell.exe Token: 33 1292 powershell.exe Token: 34 1292 powershell.exe Token: 35 1292 powershell.exe Token: 36 1292 powershell.exe Token: SeIncreaseQuotaPrivilege 1168 powershell.exe Token: SeSecurityPrivilege 1168 powershell.exe Token: SeTakeOwnershipPrivilege 1168 powershell.exe Token: SeLoadDriverPrivilege 1168 powershell.exe Token: SeSystemProfilePrivilege 1168 powershell.exe Token: SeSystemtimePrivilege 1168 powershell.exe Token: SeProfSingleProcessPrivilege 1168 powershell.exe Token: SeIncBasePriorityPrivilege 1168 powershell.exe Token: SeCreatePagefilePrivilege 1168 powershell.exe Token: SeBackupPrivilege 1168 powershell.exe Token: SeRestorePrivilege 1168 powershell.exe Token: SeShutdownPrivilege 1168 powershell.exe Token: SeDebugPrivilege 1168 powershell.exe Token: SeSystemEnvironmentPrivilege 1168 powershell.exe Token: SeRemoteShutdownPrivilege 1168 powershell.exe Token: SeUndockPrivilege 1168 powershell.exe Token: SeManageVolumePrivilege 1168 powershell.exe Token: 33 1168 powershell.exe Token: 34 1168 powershell.exe Token: 35 1168 powershell.exe Token: 36 1168 powershell.exe Token: SeIncreaseQuotaPrivilege 1188 powershell.exe Token: SeSecurityPrivilege 1188 powershell.exe Token: SeTakeOwnershipPrivilege 1188 powershell.exe Token: SeLoadDriverPrivilege 1188 powershell.exe Token: SeSystemProfilePrivilege 1188 powershell.exe Token: SeSystemtimePrivilege 1188 powershell.exe Token: SeProfSingleProcessPrivilege 1188 powershell.exe Token: SeIncBasePriorityPrivilege 1188 powershell.exe Token: SeCreatePagefilePrivilege 1188 powershell.exe Token: SeBackupPrivilege 1188 powershell.exe Token: SeRestorePrivilege 1188 powershell.exe Token: SeShutdownPrivilege 1188 powershell.exe Token: SeDebugPrivilege 1188 powershell.exe Token: SeSystemEnvironmentPrivilege 1188 powershell.exe Token: SeRemoteShutdownPrivilege 1188 powershell.exe Token: SeUndockPrivilege 1188 powershell.exe Token: SeManageVolumePrivilege 1188 powershell.exe Token: 33 1188 powershell.exe Token: 34 1188 powershell.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
VESSEL PARTICULARS - NYK LINE.doc.exeAdvancedRun.exeAdvancedRun.exedescription pid process target process PID 740 wrote to memory of 1168 740 VESSEL PARTICULARS - NYK LINE.doc.exe powershell.exe PID 740 wrote to memory of 1168 740 VESSEL PARTICULARS - NYK LINE.doc.exe powershell.exe PID 740 wrote to memory of 1168 740 VESSEL PARTICULARS - NYK LINE.doc.exe powershell.exe PID 740 wrote to memory of 1188 740 VESSEL PARTICULARS - NYK LINE.doc.exe powershell.exe PID 740 wrote to memory of 1188 740 VESSEL PARTICULARS - NYK LINE.doc.exe powershell.exe PID 740 wrote to memory of 1188 740 VESSEL PARTICULARS - NYK LINE.doc.exe powershell.exe PID 740 wrote to memory of 1292 740 VESSEL PARTICULARS - NYK LINE.doc.exe powershell.exe PID 740 wrote to memory of 1292 740 VESSEL PARTICULARS - NYK LINE.doc.exe powershell.exe PID 740 wrote to memory of 1292 740 VESSEL PARTICULARS - NYK LINE.doc.exe powershell.exe PID 740 wrote to memory of 3840 740 VESSEL PARTICULARS - NYK LINE.doc.exe powershell.exe PID 740 wrote to memory of 3840 740 VESSEL PARTICULARS - NYK LINE.doc.exe powershell.exe PID 740 wrote to memory of 3840 740 VESSEL PARTICULARS - NYK LINE.doc.exe powershell.exe PID 740 wrote to memory of 3180 740 VESSEL PARTICULARS - NYK LINE.doc.exe AdvancedRun.exe PID 740 wrote to memory of 3180 740 VESSEL PARTICULARS - NYK LINE.doc.exe AdvancedRun.exe PID 740 wrote to memory of 3180 740 VESSEL PARTICULARS - NYK LINE.doc.exe AdvancedRun.exe PID 3180 wrote to memory of 3836 3180 AdvancedRun.exe AdvancedRun.exe PID 3180 wrote to memory of 3836 3180 AdvancedRun.exe AdvancedRun.exe PID 3180 wrote to memory of 3836 3180 AdvancedRun.exe AdvancedRun.exe PID 740 wrote to memory of 2600 740 VESSEL PARTICULARS - NYK LINE.doc.exe AdvancedRun.exe PID 740 wrote to memory of 2600 740 VESSEL PARTICULARS - NYK LINE.doc.exe AdvancedRun.exe PID 740 wrote to memory of 2600 740 VESSEL PARTICULARS - NYK LINE.doc.exe AdvancedRun.exe PID 2600 wrote to memory of 2340 2600 AdvancedRun.exe AdvancedRun.exe PID 2600 wrote to memory of 2340 2600 AdvancedRun.exe AdvancedRun.exe PID 2600 wrote to memory of 2340 2600 AdvancedRun.exe AdvancedRun.exe PID 740 wrote to memory of 1308 740 VESSEL PARTICULARS - NYK LINE.doc.exe VESSEL PARTICULARS - NYK LINE.doc.exe PID 740 wrote to memory of 1308 740 VESSEL PARTICULARS - NYK LINE.doc.exe VESSEL PARTICULARS - NYK LINE.doc.exe PID 740 wrote to memory of 1308 740 VESSEL PARTICULARS - NYK LINE.doc.exe VESSEL PARTICULARS - NYK LINE.doc.exe PID 740 wrote to memory of 1140 740 VESSEL PARTICULARS - NYK LINE.doc.exe VESSEL PARTICULARS - NYK LINE.doc.exe PID 740 wrote to memory of 1140 740 VESSEL PARTICULARS - NYK LINE.doc.exe VESSEL PARTICULARS - NYK LINE.doc.exe PID 740 wrote to memory of 1140 740 VESSEL PARTICULARS - NYK LINE.doc.exe VESSEL PARTICULARS - NYK LINE.doc.exe PID 740 wrote to memory of 3160 740 VESSEL PARTICULARS - NYK LINE.doc.exe VESSEL PARTICULARS - NYK LINE.doc.exe PID 740 wrote to memory of 3160 740 VESSEL PARTICULARS - NYK LINE.doc.exe VESSEL PARTICULARS - NYK LINE.doc.exe PID 740 wrote to memory of 3160 740 VESSEL PARTICULARS - NYK LINE.doc.exe VESSEL PARTICULARS - NYK LINE.doc.exe PID 740 wrote to memory of 3160 740 VESSEL PARTICULARS - NYK LINE.doc.exe VESSEL PARTICULARS - NYK LINE.doc.exe PID 740 wrote to memory of 3160 740 VESSEL PARTICULARS - NYK LINE.doc.exe VESSEL PARTICULARS - NYK LINE.doc.exe PID 740 wrote to memory of 3160 740 VESSEL PARTICULARS - NYK LINE.doc.exe VESSEL PARTICULARS - NYK LINE.doc.exe PID 740 wrote to memory of 3160 740 VESSEL PARTICULARS - NYK LINE.doc.exe VESSEL PARTICULARS - NYK LINE.doc.exe PID 740 wrote to memory of 3160 740 VESSEL PARTICULARS - NYK LINE.doc.exe VESSEL PARTICULARS - NYK LINE.doc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe"C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.bing.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.facebook.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.twitter.com2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 31803⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 26003⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe"C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe"C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe"C:\Users\Admin\AppData\Local\Temp\VESSEL PARTICULARS - NYK LINE.doc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\VESSEL PARTICULARS - NYK LINE.doc.exe.logMD5
9e7845217df4a635ec4341c3d52ed685
SHA1d65cb39d37392975b038ce503a585adadb805da5
SHA256d60e596ed3d5c13dc9f1660e6d870d99487e1383891437645c4562a9ecaa8c9b
SHA512307c3b4d4f2655bdeb177e7b9c981ca27513618903f02c120caa755c9da5a8dd03ebab660b56108a680720a97c1e9596692490aede18cc4bd77b9fc3d8e68aa1
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
e71a0a7e48b10bde0a9c54387762f33e
SHA1fed75947f1163b00096e24a46e67d9c21e7eeebd
SHA25683d7be67d0eb544d655cc8e8eb687c26f772d6a40ebf8394e5c12b248976a2de
SHA512394c25daef6143de894505189b1edcdffb82fd6ab9de1c9e43865fb790803ff5c384debfe16236d4a9d95a78d3eea548d3cef332ed5a6881ac9c50d252c3c34a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
4355468aa7996bf8fed21f6ad2d9e1d3
SHA15f7734c4ed0a7a0e0ef63f3289b2aa1a9a7b94c3
SHA2568869e69efce43d4e48b44bbbfc4aa26dd0a1258d2ea8066a60843a784cf1a2da
SHA512a1fb28ed1b1a539630b98bf87192e7fa34d5e59715a0af1085208ceb2eef1722cecba2955c6c7c9ab5fbc9cb3f0165003abb7524d94b891b349a41ab9ebf1417
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
65fe0700d3e07034d79936487518921b
SHA167158e450670b868b413348107f2a306990c54d3
SHA256b14013dc4244f4e812537d635ea3846ca337a0647c928d934576a76d1c751f31
SHA512ee9c3544ed4dde2c69ed288b25a032a36147d70726776d34c3e5f60206664787115970ce1683f183c787f59f694187c98978973b66e0687fa0c45c06c55b7b90
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
65fe0700d3e07034d79936487518921b
SHA167158e450670b868b413348107f2a306990c54d3
SHA256b14013dc4244f4e812537d635ea3846ca337a0647c928d934576a76d1c751f31
SHA512ee9c3544ed4dde2c69ed288b25a032a36147d70726776d34c3e5f60206664787115970ce1683f183c787f59f694187c98978973b66e0687fa0c45c06c55b7b90
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
memory/740-504-0x00000000078D0000-0x000000000790C000-memory.dmpFilesize
240KB
-
memory/740-116-0x0000000005780000-0x0000000005781000-memory.dmpFilesize
4KB
-
memory/740-117-0x0000000005190000-0x0000000005191000-memory.dmpFilesize
4KB
-
memory/740-505-0x0000000000E20000-0x0000000000E44000-memory.dmpFilesize
144KB
-
memory/740-114-0x00000000008E0000-0x00000000008E1000-memory.dmpFilesize
4KB
-
memory/740-118-0x0000000005170000-0x0000000005171000-memory.dmpFilesize
4KB
-
memory/740-119-0x0000000005280000-0x000000000577E000-memory.dmpFilesize
5.0MB
-
memory/1168-136-0x00000000073C0000-0x00000000073C1000-memory.dmpFilesize
4KB
-
memory/1168-141-0x0000000007710000-0x0000000007711000-memory.dmpFilesize
4KB
-
memory/1168-140-0x00000000073C2000-0x00000000073C3000-memory.dmpFilesize
4KB
-
memory/1168-120-0x0000000000000000-mapping.dmp
-
memory/1168-206-0x00000000073C3000-0x00000000073C4000-memory.dmpFilesize
4KB
-
memory/1168-159-0x0000000008790000-0x0000000008791000-memory.dmpFilesize
4KB
-
memory/1188-139-0x0000000004B32000-0x0000000004B33000-memory.dmpFilesize
4KB
-
memory/1188-207-0x000000000A420000-0x000000000A421000-memory.dmpFilesize
4KB
-
memory/1188-121-0x0000000000000000-mapping.dmp
-
memory/1188-205-0x0000000004B33000-0x0000000004B34000-memory.dmpFilesize
4KB
-
memory/1188-132-0x0000000007510000-0x0000000007511000-memory.dmpFilesize
4KB
-
memory/1188-137-0x0000000004B30000-0x0000000004B31000-memory.dmpFilesize
4KB
-
memory/1292-144-0x0000000006BB0000-0x0000000006BB1000-memory.dmpFilesize
4KB
-
memory/1292-172-0x0000000008990000-0x0000000008991000-memory.dmpFilesize
4KB
-
memory/1292-153-0x0000000007460000-0x0000000007461000-memory.dmpFilesize
4KB
-
memory/1292-150-0x00000000074E0000-0x00000000074E1000-memory.dmpFilesize
4KB
-
memory/1292-180-0x0000000008920000-0x0000000008921000-memory.dmpFilesize
4KB
-
memory/1292-147-0x00000000072F0000-0x00000000072F1000-memory.dmpFilesize
4KB
-
memory/1292-122-0x0000000000000000-mapping.dmp
-
memory/1292-135-0x0000000006610000-0x0000000006611000-memory.dmpFilesize
4KB
-
memory/1292-129-0x0000000000CB0000-0x0000000000CB1000-memory.dmpFilesize
4KB
-
memory/1292-177-0x00000000088B0000-0x00000000088B1000-memory.dmpFilesize
4KB
-
memory/1292-203-0x0000000006613000-0x0000000006614000-memory.dmpFilesize
4KB
-
memory/1292-138-0x0000000006612000-0x0000000006613000-memory.dmpFilesize
4KB
-
memory/1292-156-0x0000000007C30000-0x0000000007C31000-memory.dmpFilesize
4KB
-
memory/2340-513-0x0000000000000000-mapping.dmp
-
memory/2600-511-0x0000000000000000-mapping.dmp
-
memory/3160-515-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3160-516-0x0000000000436ABE-mapping.dmp
-
memory/3160-522-0x00000000056F0000-0x00000000056F1000-memory.dmpFilesize
4KB
-
memory/3180-506-0x0000000000000000-mapping.dmp
-
memory/3836-509-0x0000000000000000-mapping.dmp
-
memory/3840-454-0x0000000004B83000-0x0000000004B84000-memory.dmpFilesize
4KB
-
memory/3840-421-0x0000000004B82000-0x0000000004B83000-memory.dmpFilesize
4KB
-
memory/3840-420-0x0000000004B80000-0x0000000004B81000-memory.dmpFilesize
4KB
-
memory/3840-408-0x0000000000000000-mapping.dmp