Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
29-09-2021 14:08
Static task
static1
Behavioral task
behavioral1
Sample
1ZA109T4043832978.html
Resource
win7v20210408
General
-
Target
1ZA109T4043832978.html
-
Size
964KB
-
MD5
110d30a1d7b3e9db16ee8a1b26809973
-
SHA1
3ce7f7238d5be83f9271d81d3d4e39427b232de4
-
SHA256
9755c765d48923802c2e5824522c2e25a0bfaece419061d6e223e7f74a067d18
-
SHA512
d90ac13381a6c5e8c8a5e1b66dc63e1ec9f90ba2715d82ac3fe8651d59a88b9d142c63d8dd16274f449fd6f6b396fa976ec4470c1d4dd3f773c14bc9a2a2b869
Malware Config
Extracted
xloader
2.5
tr7h
http://www.globalinterchangellc.com/tr7h/
hnhstudios.com
du-lang.com
lonestartradeoilllc.com
criptool.online
rebus-automotive.com
boxedwallconsepts.net
helixarray.com
jinqiaodianfen.com
goldenwaxi.com
comprarloterianacional.com
digebitdigital.com
cryptoupp.com
332151.com
bousui.club
redakassoumeh.com
giantinosglobalreachstore.com
resultsnft.com
papicolar.com
juvesti.com
tax-kaikei.com
fondosanimados.com
iamdrina.com
thenerdversity.com
dbdembroidery.com
credreality.com
brandinghollywood.com
texasshydraulics.com
empresafabago.com
oscyrk.com
greenworlder-game.com
smarti.space
cablerailingdesign.com
miura-conseil.biz
investoroffence.com
economicfreedomtools.com
xn--espaol101-o6a.online
tamoca.com
vezmnmnr.xyz
muniaduttafoundation.com
penshowmaps.com
thelettingagent.online
nfractal.digital
5151vip36.com
artelaser.net
001yu.xyz
xn--grlitzerseebhne-8sb7i.com
starlamovement.com
minacezsa.xyz
dizajnbalkona.store
edenhomeinspections.com
knx-concept.info
mccorveywedding.com
efterpisart.com
superbitems.com
beandhira.com
dawang999.com
kentvebaskanodulleri.com
range4tis.com
clark-painting.com
associatedmove.com
whwzhsw.com
yiganyimiao.com
pingwangjinrong.com
drivingflex.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2956-132-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2956-133-0x000000000041D4C0-mapping.dmp xloader behavioral2/memory/1480-139-0x0000000002C80000-0x0000000002CA9000-memory.dmp xloader -
Suspicious use of SetThreadContext 2 IoCs
Processes:
1ZA109T4043832978.exe1ZA109T4043832978.exedescription pid process target process PID 2308 set thread context of 2956 2308 1ZA109T4043832978.exe 1ZA109T4043832978.exe PID 2956 set thread context of 3060 2956 1ZA109T4043832978.exe Explorer.EXE -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 6ead5207ab2cd701 iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e2ca0a936721564c9b4d4e9132301c7f000000000200000000001066000000010000200000009def3310b0a5c6ee22218bddcece4d6fd89bd6504566aeb7389d5f00cb5fe4dc000000000e8000000002000020000000cd3c12540609fc381c138b14816197d6023e7a6ff8091be4c63ccdc7e59e5d9b200000009c098082baf3f64d0607b824aff9c774ceca49324fe0e7ad6095ff8fa14cef61400000009c51c6b1b20fd010e233c1f2418ec9b2c5c244c82af94081283c5e2211e8b6be579bfc9bd5ff99d8d378c132447f439509d8dc1953927e9d9b8fe9845dfd4ed1 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30913868" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 305339594cb5d701 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "339713288" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7FC66B0A-213F-11EC-B2DB-5A4A21AC7400} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\RepId\PublicId = "{40354911-226D-4C8D-A235-78C1E8B1055A}" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0010c594cb5d701 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e2ca0a936721564c9b4d4e9132301c7f000000000200000000001066000000010000200000009d6fad6212a9368a2f9eff1b1d229d6358a265fa18c815f0e33e0c2320e79c64000000000e8000000002000020000000a83d28422c28f7abcb1b74438108e34a45e804b4ab84b3da6860ee69bf6dde5f20000000a800fbbe73afe52b6f03a310eaf5cabffe0ac410d7ad9ba2ac70b3ae4f1efe3c400000002fd8aba9c4c6fc474ec060cf42a924a87f302e5f9a9faca5fc0a3792debd45af21552ee6e26709967387f5b21dce294c3f6a7cba6f1a8fd996c476fc359e2707 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1418073613" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30913868" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30913868" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1418073613" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1465682870" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "339745279" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "339696694" iexplore.exe -
Modifies registry class 1 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings iexplore.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
1ZA109T4043832978.exeraserver.exepid process 2956 1ZA109T4043832978.exe 2956 1ZA109T4043832978.exe 2956 1ZA109T4043832978.exe 2956 1ZA109T4043832978.exe 1480 raserver.exe 1480 raserver.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
1ZA109T4043832978.exepid process 2956 1ZA109T4043832978.exe 2956 1ZA109T4043832978.exe 2956 1ZA109T4043832978.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
1ZA109T4043832978.exeraserver.exedescription pid process Token: SeDebugPrivilege 2956 1ZA109T4043832978.exe Token: SeDebugPrivilege 1480 raserver.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 656 iexplore.exe 656 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 656 iexplore.exe 656 iexplore.exe 428 IEXPLORE.EXE 428 IEXPLORE.EXE 428 IEXPLORE.EXE 428 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
iexplore.exe1ZA109T4043832978.exeExplorer.EXEraserver.exedescription pid process target process PID 656 wrote to memory of 428 656 iexplore.exe IEXPLORE.EXE PID 656 wrote to memory of 428 656 iexplore.exe IEXPLORE.EXE PID 656 wrote to memory of 428 656 iexplore.exe IEXPLORE.EXE PID 2308 wrote to memory of 2956 2308 1ZA109T4043832978.exe 1ZA109T4043832978.exe PID 2308 wrote to memory of 2956 2308 1ZA109T4043832978.exe 1ZA109T4043832978.exe PID 2308 wrote to memory of 2956 2308 1ZA109T4043832978.exe 1ZA109T4043832978.exe PID 2308 wrote to memory of 2956 2308 1ZA109T4043832978.exe 1ZA109T4043832978.exe PID 2308 wrote to memory of 2956 2308 1ZA109T4043832978.exe 1ZA109T4043832978.exe PID 2308 wrote to memory of 2956 2308 1ZA109T4043832978.exe 1ZA109T4043832978.exe PID 3060 wrote to memory of 1480 3060 Explorer.EXE raserver.exe PID 3060 wrote to memory of 1480 3060 Explorer.EXE raserver.exe PID 3060 wrote to memory of 1480 3060 Explorer.EXE raserver.exe PID 1480 wrote to memory of 3328 1480 raserver.exe cmd.exe PID 1480 wrote to memory of 3328 1480 raserver.exe cmd.exe PID 1480 wrote to memory of 3328 1480 raserver.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\1ZA109T4043832978.html2⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:656 CREDAT:82945 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\Temp1_1ZA109T4043832978.zip\1ZA109T4043832978.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_1ZA109T4043832978.zip\1ZA109T4043832978.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Temp1_1ZA109T4043832978.zip\1ZA109T4043832978.exe"C:\Users\Admin\AppData\Local\Temp\Temp1_1ZA109T4043832978.zip\1ZA109T4043832978.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Temp1_1ZA109T4043832978.zip\1ZA109T4043832978.exe"3⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
9f20688c661750ad6dcf06eda97f88ba
SHA1a0c2e5929e9d6ed87ae9d555fd8a1c49cbb984ec
SHA256325486c68075a5858c7fa3bae5e88791eaee7f42546d0436c64d9742d22eae3b
SHA512839b542d80a961ee40effea26f4da8d85e7a1e06e76b5462ad71e853e9554fed9bc1011c3bce03f60a1d5844cd09c194923776507d771a28c8ae47482dfebec2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776MD5
39158949ba86276f88843d57727ed8c5
SHA13b09d6c837ecba835f93a45143aaf38193629d10
SHA256a9a1bed1abf88944379f40d8407607d884928477229f175d89038480ab69562b
SHA512fd7153bb816241b39072849de5bbf180c7b8f768054a39da1d8078783b4de3ab01580e6879bb0b74db74cc7663c99d729c2fa0cc8d56458e43eb53d1e48f1c70
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\NPXJ0CH4\1ZA109T4043832978.zip.pyq5ben.partialMD5
00752f351a7e9b505c1a447c0622bc8b
SHA1c50446059e63de394c6c79799ab08c8a577e95d8
SHA2568156deadf31feb5a8d2b0de8168c6ea2d07d1d3e5d48e90e425c08417b020a7c
SHA512c3f42a01f2d7d27835d8a524b31249649722837f5e2e9c60384559c439e8b04110e92da26a164d6090de329714178bc85812cd0c3c37f274cbeda40f286eea3d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\1ARWIR2Z.cookieMD5
1144034ebcf01d290445e8755f673adf
SHA126293043f618971f948c7ac68fff409f91892a7d
SHA2564dacb4f8879369831ca799eba05cf486383a05d4c25968c96a87c32c4e4c2ed7
SHA512b33b2429a5c2592002c3a38758ab2c181fe90463da18aab5659841e8d1e522ee054a57ce1d91e1b67205cd72a5be9302c31d9ccd0f2c3d91f84e6d45e2baf10e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\SQDY2ESH.cookieMD5
fac561761d844d49eb0cee21d10ecf1a
SHA150c368a2865308dbd96c9ab1930b250b896b772b
SHA2565a5d86b48d702bb668422b105b3b1c23a4147fe79b4c37aba6d1d8520c615f39
SHA5120d550aa183189cbd96a2e360c4882d06b5505e2c7ece319c33eaed405102bb6037c12f0ceb8aa7b2895c3bae5a45434f129e3448af111c831052db0c99a2581c
-
memory/428-115-0x0000000000000000-mapping.dmp
-
memory/656-114-0x00007FFA90940000-0x00007FFA909AB000-memory.dmpFilesize
428KB
-
memory/1480-141-0x0000000004570000-0x0000000004890000-memory.dmpFilesize
3.1MB
-
memory/1480-139-0x0000000002C80000-0x0000000002CA9000-memory.dmpFilesize
164KB
-
memory/1480-138-0x0000000000370000-0x000000000038F000-memory.dmpFilesize
124KB
-
memory/1480-137-0x0000000000000000-mapping.dmp
-
memory/2308-127-0x0000000005320000-0x00000000053B2000-memory.dmpFilesize
584KB
-
memory/2308-125-0x0000000005470000-0x0000000005471000-memory.dmpFilesize
4KB
-
memory/2308-128-0x0000000005610000-0x0000000005623000-memory.dmpFilesize
76KB
-
memory/2308-129-0x0000000008E00000-0x0000000008E68000-memory.dmpFilesize
416KB
-
memory/2308-130-0x00000000088D0000-0x00000000088D2000-memory.dmpFilesize
8KB
-
memory/2308-131-0x0000000008E70000-0x0000000008EA8000-memory.dmpFilesize
224KB
-
memory/2308-121-0x0000000000AB0000-0x0000000000AB1000-memory.dmpFilesize
4KB
-
memory/2308-126-0x0000000008900000-0x0000000008901000-memory.dmpFilesize
4KB
-
memory/2308-123-0x0000000005990000-0x0000000005991000-memory.dmpFilesize
4KB
-
memory/2308-124-0x00000000053C0000-0x00000000053C1000-memory.dmpFilesize
4KB
-
memory/2956-133-0x000000000041D4C0-mapping.dmp
-
memory/2956-134-0x00000000013C0000-0x00000000016E0000-memory.dmpFilesize
3.1MB
-
memory/2956-135-0x00000000017C0000-0x00000000017D1000-memory.dmpFilesize
68KB
-
memory/2956-132-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3060-136-0x0000000006D80000-0x0000000006E38000-memory.dmpFilesize
736KB
-
memory/3328-140-0x0000000000000000-mapping.dmp