Analysis
-
max time kernel
4265100s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
17-01-2022 09:07
Static task
static1
Behavioral task
behavioral1
Sample
91409398a37f95ac3501f372a7d9a6b8.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
91409398a37f95ac3501f372a7d9a6b8.exe
Resource
win10v2004-en-20220112
General
-
Target
91409398a37f95ac3501f372a7d9a6b8.exe
-
Size
277KB
-
MD5
91409398a37f95ac3501f372a7d9a6b8
-
SHA1
fc8089310ec1d3c1a42d7aa5d343c8fe2f2b7731
-
SHA256
39e1259929a3470b6d064daadf4742ddd59065fa1d72aa334ed298648f27697f
-
SHA512
5e8d9d69da0a23f21f611272fe035e52ceec87fa0ae3ec5c07dcddaa908c41fc36ce67a64cc1de19b2ba69822ca5b43b4b18ab0ab25dcdd1b1dbb1a42c9a1282
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
arkei
Default
http://file-file-host4.com/tratata.php
Extracted
tofsee
patmushta.info
parubey.info
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 1356 created 3384 1356 WerFault.exe 4421.exe -
Arkei Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3384-149-0x0000000000400000-0x00000000005D0000-memory.dmp family_arkei behavioral2/memory/3384-148-0x0000000000720000-0x000000000073C000-memory.dmp family_arkei -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 6 IoCs
Processes:
3D69.exe4421.exe472F.exe48E5.exegnizejvc.exe48E5.exepid process 3084 3D69.exe 3384 4421.exe 3024 472F.exe 744 48E5.exe 1208 gnizejvc.exe 1376 48E5.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
472F.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 472F.exe -
Drops file in System32 directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile:.repos svchost.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
91409398a37f95ac3501f372a7d9a6b8.exegnizejvc.exe48E5.exedescription pid process target process PID 764 set thread context of 4064 764 91409398a37f95ac3501f372a7d9a6b8.exe 91409398a37f95ac3501f372a7d9a6b8.exe PID 1208 set thread context of 1324 1208 gnizejvc.exe svchost.exe PID 744 set thread context of 1376 744 48E5.exe 48E5.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1392 3024 WerFault.exe 472F.exe 436 1208 WerFault.exe gnizejvc.exe 1084 3384 WerFault.exe 4421.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
3D69.exe91409398a37f95ac3501f372a7d9a6b8.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3D69.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3D69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 91409398a37f95ac3501f372a7d9a6b8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 91409398a37f95ac3501f372a7d9a6b8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 91409398a37f95ac3501f372a7d9a6b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3D69.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
MusNotification.exeWerFault.exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 MusNotification.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz MusNotification.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WerFault.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WerFault.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
WerFault.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WerFault.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WerFault.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
svchost.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Control Panel\Buses\Config0 = 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 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Control Panel\Buses svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
91409398a37f95ac3501f372a7d9a6b8.exepid process 4064 91409398a37f95ac3501f372a7d9a6b8.exe 4064 91409398a37f95ac3501f372a7d9a6b8.exe 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 2508 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2508 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
91409398a37f95ac3501f372a7d9a6b8.exe3D69.exepid process 4064 91409398a37f95ac3501f372a7d9a6b8.exe 3084 3D69.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
MusNotification.exe48E5.exeWerFault.exedescription pid process Token: SeShutdownPrivilege 3132 MusNotification.exe Token: SeCreatePagefilePrivilege 3132 MusNotification.exe Token: SeShutdownPrivilege 2508 Token: SeCreatePagefilePrivilege 2508 Token: SeDebugPrivilege 744 48E5.exe Token: SeShutdownPrivilege 2508 Token: SeCreatePagefilePrivilege 2508 Token: SeShutdownPrivilege 2508 Token: SeCreatePagefilePrivilege 2508 Token: SeShutdownPrivilege 2508 Token: SeCreatePagefilePrivilege 2508 Token: SeShutdownPrivilege 2508 Token: SeCreatePagefilePrivilege 2508 Token: SeShutdownPrivilege 2508 Token: SeCreatePagefilePrivilege 2508 Token: SeShutdownPrivilege 2508 Token: SeCreatePagefilePrivilege 2508 Token: SeRestorePrivilege 1084 WerFault.exe Token: SeBackupPrivilege 1084 WerFault.exe Token: SeShutdownPrivilege 2508 Token: SeCreatePagefilePrivilege 2508 -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
91409398a37f95ac3501f372a7d9a6b8.exe472F.exe48E5.exegnizejvc.exeWerFault.exedescription pid process target process PID 764 wrote to memory of 4064 764 91409398a37f95ac3501f372a7d9a6b8.exe 91409398a37f95ac3501f372a7d9a6b8.exe PID 764 wrote to memory of 4064 764 91409398a37f95ac3501f372a7d9a6b8.exe 91409398a37f95ac3501f372a7d9a6b8.exe PID 764 wrote to memory of 4064 764 91409398a37f95ac3501f372a7d9a6b8.exe 91409398a37f95ac3501f372a7d9a6b8.exe PID 764 wrote to memory of 4064 764 91409398a37f95ac3501f372a7d9a6b8.exe 91409398a37f95ac3501f372a7d9a6b8.exe PID 764 wrote to memory of 4064 764 91409398a37f95ac3501f372a7d9a6b8.exe 91409398a37f95ac3501f372a7d9a6b8.exe PID 764 wrote to memory of 4064 764 91409398a37f95ac3501f372a7d9a6b8.exe 91409398a37f95ac3501f372a7d9a6b8.exe PID 2508 wrote to memory of 3084 2508 3D69.exe PID 2508 wrote to memory of 3084 2508 3D69.exe PID 2508 wrote to memory of 3084 2508 3D69.exe PID 2508 wrote to memory of 3384 2508 4421.exe PID 2508 wrote to memory of 3384 2508 4421.exe PID 2508 wrote to memory of 3384 2508 4421.exe PID 2508 wrote to memory of 3024 2508 472F.exe PID 2508 wrote to memory of 3024 2508 472F.exe PID 2508 wrote to memory of 3024 2508 472F.exe PID 2508 wrote to memory of 744 2508 48E5.exe PID 2508 wrote to memory of 744 2508 48E5.exe PID 2508 wrote to memory of 744 2508 48E5.exe PID 3024 wrote to memory of 3652 3024 472F.exe cmd.exe PID 3024 wrote to memory of 3652 3024 472F.exe cmd.exe PID 3024 wrote to memory of 3652 3024 472F.exe cmd.exe PID 3024 wrote to memory of 2152 3024 472F.exe cmd.exe PID 3024 wrote to memory of 2152 3024 472F.exe cmd.exe PID 3024 wrote to memory of 2152 3024 472F.exe cmd.exe PID 3024 wrote to memory of 1880 3024 472F.exe sc.exe PID 3024 wrote to memory of 1880 3024 472F.exe sc.exe PID 3024 wrote to memory of 1880 3024 472F.exe sc.exe PID 3024 wrote to memory of 3252 3024 472F.exe sc.exe PID 3024 wrote to memory of 3252 3024 472F.exe sc.exe PID 3024 wrote to memory of 3252 3024 472F.exe sc.exe PID 3024 wrote to memory of 2964 3024 472F.exe sc.exe PID 3024 wrote to memory of 2964 3024 472F.exe sc.exe PID 3024 wrote to memory of 2964 3024 472F.exe sc.exe PID 744 wrote to memory of 1376 744 48E5.exe 48E5.exe PID 744 wrote to memory of 1376 744 48E5.exe 48E5.exe PID 744 wrote to memory of 1376 744 48E5.exe 48E5.exe PID 3024 wrote to memory of 520 3024 472F.exe netsh.exe PID 3024 wrote to memory of 520 3024 472F.exe netsh.exe PID 3024 wrote to memory of 520 3024 472F.exe netsh.exe PID 1208 wrote to memory of 1324 1208 gnizejvc.exe svchost.exe PID 1208 wrote to memory of 1324 1208 gnizejvc.exe svchost.exe PID 1208 wrote to memory of 1324 1208 gnizejvc.exe svchost.exe PID 1208 wrote to memory of 1324 1208 gnizejvc.exe svchost.exe PID 1208 wrote to memory of 1324 1208 gnizejvc.exe svchost.exe PID 744 wrote to memory of 1376 744 48E5.exe 48E5.exe PID 744 wrote to memory of 1376 744 48E5.exe 48E5.exe PID 744 wrote to memory of 1376 744 48E5.exe 48E5.exe PID 744 wrote to memory of 1376 744 48E5.exe 48E5.exe PID 744 wrote to memory of 1376 744 48E5.exe 48E5.exe PID 1356 wrote to memory of 3384 1356 WerFault.exe 4421.exe PID 1356 wrote to memory of 3384 1356 WerFault.exe 4421.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\91409398a37f95ac3501f372a7d9a6b8.exe"C:\Users\Admin\AppData\Local\Temp\91409398a37f95ac3501f372a7d9a6b8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\91409398a37f95ac3501f372a7d9a6b8.exe"C:\Users\Admin\AppData\Local\Temp\91409398a37f95ac3501f372a7d9a6b8.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe1⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\3D69.exeC:\Users\Admin\AppData\Local\Temp\3D69.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\4421.exeC:\Users\Admin\AppData\Local\Temp\4421.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3384 -s 5522⤵
- Program crash
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\472F.exeC:\Users\Admin\AppData\Local\Temp\472F.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\jmtvfxng\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\gnizejvc.exe" C:\Windows\SysWOW64\jmtvfxng\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create jmtvfxng binPath= "C:\Windows\SysWOW64\jmtvfxng\gnizejvc.exe /d\"C:\Users\Admin\AppData\Local\Temp\472F.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description jmtvfxng "wifi internet conection"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start jmtvfxng2⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 6642⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\48E5.exeC:\Users\Admin\AppData\Local\Temp\48E5.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\48E5.exeC:\Users\Admin\AppData\Local\Temp\48E5.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\jmtvfxng\gnizejvc.exeC:\Windows\SysWOW64\jmtvfxng\gnizejvc.exe /d"C:\Users\Admin\AppData\Local\Temp\472F.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 5202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3024 -ip 30241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 1208 -ip 12081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3384 -ip 33841⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\48E5.exe.logMD5
e5352797047ad2c91b83e933b24fbc4f
SHA19bf8ac99b6cbf7ce86ce69524c25e3df75b4d772
SHA256b4643874d42d232c55bfbb75c36da41809d0c9ba4b2a203049aa82950345325c
SHA512dd2fc1966c8b3c9511f14801d1ce8110d6bca276a58216b5eeb0a3cfbb0cc8137ea14efbf790e63736230141da456cbaaa4e5c66f2884d4cfe68f499476fd827
-
C:\Users\Admin\AppData\Local\Temp\3D69.exeMD5
277680bd3182eb0940bc356ff4712bef
SHA15995ae9d0247036cc6d3ea741e7504c913f1fb76
SHA256f9f0aaf36f064cdfc25a12663ffa348eb6d923a153f08c7ca9052dcb184b3570
SHA5120b777d45c50eae00ad050d3b2a78fa60eb78fe837696a6562007ed628719784655ba13edcbbee953f7eefade49599ee6d3d23e1c585114d7aecddda9ad1d0ecb
-
C:\Users\Admin\AppData\Local\Temp\3D69.exeMD5
277680bd3182eb0940bc356ff4712bef
SHA15995ae9d0247036cc6d3ea741e7504c913f1fb76
SHA256f9f0aaf36f064cdfc25a12663ffa348eb6d923a153f08c7ca9052dcb184b3570
SHA5120b777d45c50eae00ad050d3b2a78fa60eb78fe837696a6562007ed628719784655ba13edcbbee953f7eefade49599ee6d3d23e1c585114d7aecddda9ad1d0ecb
-
C:\Users\Admin\AppData\Local\Temp\4421.exeMD5
322662f080783dcbb75ccff43ca6543f
SHA1b723935d7dc52d0b1513cf13fabeab7203db247a
SHA256f8f3a30f2e20482b95fcb7424ede443d2b4dd31ce6b4bdee484d01c2af5000de
SHA5125909f29955b6b77613312d1cadb5304341ab6844755a14dbd4bbd52e9bc1ffa70a0f9585198ff77ee7e577dca0e9bb473df4298e582abde5b60842c2232c9895
-
C:\Users\Admin\AppData\Local\Temp\4421.exeMD5
322662f080783dcbb75ccff43ca6543f
SHA1b723935d7dc52d0b1513cf13fabeab7203db247a
SHA256f8f3a30f2e20482b95fcb7424ede443d2b4dd31ce6b4bdee484d01c2af5000de
SHA5125909f29955b6b77613312d1cadb5304341ab6844755a14dbd4bbd52e9bc1ffa70a0f9585198ff77ee7e577dca0e9bb473df4298e582abde5b60842c2232c9895
-
C:\Users\Admin\AppData\Local\Temp\472F.exeMD5
d70994d5c78d22a8a493b1e690f95ccf
SHA129a0395a59b34795bbc16bfaded5588e89331b03
SHA256d37e12034bed283116bb6efa7913eb98ee06d1e7ea673f0716c83c7dd081dade
SHA512e897f008c15f720e0c324d988a49a89572f53d7090c61436cbbdf266120df4c8a2f9f3a0dd1d662ba9bae47760d0445f3cea89d280fd56f0014792808afae280
-
C:\Users\Admin\AppData\Local\Temp\472F.exeMD5
d70994d5c78d22a8a493b1e690f95ccf
SHA129a0395a59b34795bbc16bfaded5588e89331b03
SHA256d37e12034bed283116bb6efa7913eb98ee06d1e7ea673f0716c83c7dd081dade
SHA512e897f008c15f720e0c324d988a49a89572f53d7090c61436cbbdf266120df4c8a2f9f3a0dd1d662ba9bae47760d0445f3cea89d280fd56f0014792808afae280
-
C:\Users\Admin\AppData\Local\Temp\48E5.exeMD5
29e5d8cbcf13639096bf1353b5f9f48b
SHA1800629d06593b7fb232a2dfd08384c4349f37382
SHA256ba587b88b891dfe4c810be48e336cdae9d474618d9d0a3a0637cd2349cc307e2
SHA5123e394d30c9d50b2ab61b6d9f2942313ec6cee2a4fd873d977bcfe6e62ce05596b62d0993294311da381eb47ad040a41307b192761501a47c8995624288aa5354
-
C:\Users\Admin\AppData\Local\Temp\48E5.exeMD5
29e5d8cbcf13639096bf1353b5f9f48b
SHA1800629d06593b7fb232a2dfd08384c4349f37382
SHA256ba587b88b891dfe4c810be48e336cdae9d474618d9d0a3a0637cd2349cc307e2
SHA5123e394d30c9d50b2ab61b6d9f2942313ec6cee2a4fd873d977bcfe6e62ce05596b62d0993294311da381eb47ad040a41307b192761501a47c8995624288aa5354
-
C:\Users\Admin\AppData\Local\Temp\48E5.exeMD5
29e5d8cbcf13639096bf1353b5f9f48b
SHA1800629d06593b7fb232a2dfd08384c4349f37382
SHA256ba587b88b891dfe4c810be48e336cdae9d474618d9d0a3a0637cd2349cc307e2
SHA5123e394d30c9d50b2ab61b6d9f2942313ec6cee2a4fd873d977bcfe6e62ce05596b62d0993294311da381eb47ad040a41307b192761501a47c8995624288aa5354
-
C:\Users\Admin\AppData\Local\Temp\gnizejvc.exeMD5
e3dbcc043c2eea51fd99978e47d0af6a
SHA1a2294a40ca68bd652d8e31342eea80a0038a8fa4
SHA2563fc51ceac875de50a8e84b79d18f35dbb77a39b42cf7dc0765fd83340ed95231
SHA51208aacc88f8ca40b2af67e343388d29321b8d455a95711e6d62d8023d2a3d27b52429bf26e613bd258e1d61828dc7ee6acb95a0b4ec95b22b2234f4cb449739ec
-
C:\Windows\SysWOW64\jmtvfxng\gnizejvc.exeMD5
e3dbcc043c2eea51fd99978e47d0af6a
SHA1a2294a40ca68bd652d8e31342eea80a0038a8fa4
SHA2563fc51ceac875de50a8e84b79d18f35dbb77a39b42cf7dc0765fd83340ed95231
SHA51208aacc88f8ca40b2af67e343388d29321b8d455a95711e6d62d8023d2a3d27b52429bf26e613bd258e1d61828dc7ee6acb95a0b4ec95b22b2234f4cb449739ec
-
memory/520-170-0x0000000000000000-mapping.dmp
-
memory/744-166-0x00000000058D0000-0x00000000058EE000-memory.dmpFilesize
120KB
-
memory/744-168-0x0000000005F70000-0x0000000006514000-memory.dmpFilesize
5.6MB
-
memory/744-155-0x0000000000F10000-0x0000000000F9A000-memory.dmpFilesize
552KB
-
memory/744-164-0x0000000005910000-0x0000000005986000-memory.dmpFilesize
472KB
-
memory/744-162-0x0000000003250000-0x0000000003251000-memory.dmpFilesize
4KB
-
memory/744-161-0x00000000059A0000-0x00000000059A1000-memory.dmpFilesize
4KB
-
memory/744-150-0x0000000000000000-mapping.dmp
-
memory/744-154-0x0000000000F10000-0x0000000000F9A000-memory.dmpFilesize
552KB
-
memory/764-130-0x00000000008E8000-0x00000000008F9000-memory.dmpFilesize
68KB
-
memory/764-131-0x0000000000860000-0x0000000000869000-memory.dmpFilesize
36KB
-
memory/1208-172-0x00000000008A3000-0x00000000008B3000-memory.dmpFilesize
64KB
-
memory/1208-177-0x0000000000400000-0x00000000005CF000-memory.dmpFilesize
1.8MB
-
memory/1324-174-0x00000000003D0000-0x00000000003E5000-memory.dmpFilesize
84KB
-
memory/1324-173-0x0000000000000000-mapping.dmp
-
memory/1324-176-0x00000000002F0000-0x00000000002F1000-memory.dmpFilesize
4KB
-
memory/1324-175-0x00000000002F0000-0x00000000002F1000-memory.dmpFilesize
4KB
-
memory/1376-186-0x0000000004E70000-0x0000000004F7A000-memory.dmpFilesize
1.0MB
-
memory/1376-185-0x0000000002980000-0x0000000002992000-memory.dmpFilesize
72KB
-
memory/1376-188-0x0000000004D60000-0x0000000005378000-memory.dmpFilesize
6.1MB
-
memory/1376-179-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1376-187-0x0000000004D60000-0x0000000004D9C000-memory.dmpFilesize
240KB
-
memory/1376-183-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1376-182-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1376-184-0x0000000005380000-0x0000000005998000-memory.dmpFilesize
6.1MB
-
memory/1376-178-0x0000000000000000-mapping.dmp
-
memory/1880-163-0x0000000000000000-mapping.dmp
-
memory/2152-159-0x0000000000000000-mapping.dmp
-
memory/2508-134-0x0000000000C60000-0x0000000000C76000-memory.dmpFilesize
88KB
-
memory/2508-171-0x0000000002E50000-0x0000000002E66000-memory.dmpFilesize
88KB
-
memory/2964-167-0x0000000000000000-mapping.dmp
-
memory/3024-145-0x0000000000000000-mapping.dmp
-
memory/3024-158-0x0000000000400000-0x00000000005CF000-memory.dmpFilesize
1.8MB
-
memory/3024-157-0x0000000000740000-0x0000000000753000-memory.dmpFilesize
76KB
-
memory/3024-153-0x0000000000609000-0x000000000061A000-memory.dmpFilesize
68KB
-
memory/3084-140-0x0000000000400000-0x0000000000452000-memory.dmpFilesize
328KB
-
memory/3084-135-0x0000000000000000-mapping.dmp
-
memory/3084-139-0x0000000000580000-0x0000000000589000-memory.dmpFilesize
36KB
-
memory/3084-138-0x0000000000560000-0x0000000000569000-memory.dmpFilesize
36KB
-
memory/3252-165-0x0000000000000000-mapping.dmp
-
memory/3384-149-0x0000000000400000-0x00000000005D0000-memory.dmpFilesize
1.8MB
-
memory/3384-141-0x0000000000000000-mapping.dmp
-
memory/3384-144-0x00000000007A9000-0x00000000007BA000-memory.dmpFilesize
68KB
-
memory/3384-148-0x0000000000720000-0x000000000073C000-memory.dmpFilesize
112KB
-
memory/3652-156-0x0000000000000000-mapping.dmp
-
memory/4064-133-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/4064-132-0x0000000000000000-mapping.dmp