Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
26-01-2022 12:16
Static task
static1
General
-
Target
9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe
-
Size
298KB
-
MD5
935e022330708967113c88e15f8b01c3
-
SHA1
7cf14b3324d826a0fed00f66a282ea7c9b9b14eb
-
SHA256
9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5
-
SHA512
362939a7d6ce2f7ddc71a5af3d9e5b8d9505a8f12578258d358351057b008d63a4d22e8d53308632874293b66973292cc73868aa6f13bf995b40753c2d9c70ca
Malware Config
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3984-128-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Executes dropped EXE 2 IoCs
Processes:
Data.exeData.exepid process 3664 Data.exe 1856 Data.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exeData.exedescription pid process target process PID 2476 set thread context of 3984 2476 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe PID 3664 set thread context of 1856 3664 Data.exe Data.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 608 schtasks.exe 3980 schtasks.exe 2992 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2300 timeout.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exepowershell.exe9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exepowershell.exepid process 2476 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 2476 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 1184 powershell.exe 1184 powershell.exe 1184 powershell.exe 3984 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 3984 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 3984 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 3984 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 3984 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 3984 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 3984 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 3984 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 3984 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 3984 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 3984 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 3984 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 3984 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 3132 powershell.exe 3132 powershell.exe 3132 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exepowershell.exe9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exepowershell.exeData.exedescription pid process Token: SeDebugPrivilege 2476 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe Token: SeDebugPrivilege 1184 powershell.exe Token: SeDebugPrivilege 3984 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe Token: SeDebugPrivilege 3132 powershell.exe Token: SeDebugPrivilege 1856 Data.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.execmd.execmd.exeData.exedescription pid process target process PID 2476 wrote to memory of 1184 2476 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe powershell.exe PID 2476 wrote to memory of 1184 2476 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe powershell.exe PID 2476 wrote to memory of 1184 2476 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe powershell.exe PID 2476 wrote to memory of 608 2476 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe schtasks.exe PID 2476 wrote to memory of 608 2476 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe schtasks.exe PID 2476 wrote to memory of 608 2476 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe schtasks.exe PID 2476 wrote to memory of 3120 2476 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe PID 2476 wrote to memory of 3120 2476 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe PID 2476 wrote to memory of 3120 2476 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe PID 2476 wrote to memory of 3984 2476 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe PID 2476 wrote to memory of 3984 2476 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe PID 2476 wrote to memory of 3984 2476 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe PID 2476 wrote to memory of 3984 2476 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe PID 2476 wrote to memory of 3984 2476 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe PID 2476 wrote to memory of 3984 2476 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe PID 2476 wrote to memory of 3984 2476 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe PID 2476 wrote to memory of 3984 2476 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe PID 3984 wrote to memory of 2296 3984 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe cmd.exe PID 3984 wrote to memory of 2296 3984 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe cmd.exe PID 3984 wrote to memory of 2296 3984 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe cmd.exe PID 3984 wrote to memory of 1716 3984 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe cmd.exe PID 3984 wrote to memory of 1716 3984 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe cmd.exe PID 3984 wrote to memory of 1716 3984 9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe cmd.exe PID 2296 wrote to memory of 3980 2296 cmd.exe schtasks.exe PID 2296 wrote to memory of 3980 2296 cmd.exe schtasks.exe PID 2296 wrote to memory of 3980 2296 cmd.exe schtasks.exe PID 1716 wrote to memory of 2300 1716 cmd.exe timeout.exe PID 1716 wrote to memory of 2300 1716 cmd.exe timeout.exe PID 1716 wrote to memory of 2300 1716 cmd.exe timeout.exe PID 1716 wrote to memory of 3664 1716 cmd.exe Data.exe PID 1716 wrote to memory of 3664 1716 cmd.exe Data.exe PID 1716 wrote to memory of 3664 1716 cmd.exe Data.exe PID 3664 wrote to memory of 3132 3664 Data.exe powershell.exe PID 3664 wrote to memory of 3132 3664 Data.exe powershell.exe PID 3664 wrote to memory of 3132 3664 Data.exe powershell.exe PID 3664 wrote to memory of 2992 3664 Data.exe schtasks.exe PID 3664 wrote to memory of 2992 3664 Data.exe schtasks.exe PID 3664 wrote to memory of 2992 3664 Data.exe schtasks.exe PID 3664 wrote to memory of 1856 3664 Data.exe Data.exe PID 3664 wrote to memory of 1856 3664 Data.exe Data.exe PID 3664 wrote to memory of 1856 3664 Data.exe Data.exe PID 3664 wrote to memory of 1856 3664 Data.exe Data.exe PID 3664 wrote to memory of 1856 3664 Data.exe Data.exe PID 3664 wrote to memory of 1856 3664 Data.exe Data.exe PID 3664 wrote to memory of 1856 3664 Data.exe Data.exe PID 3664 wrote to memory of 1856 3664 Data.exe Data.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe"C:\Users\Admin\AppData\Local\Temp\9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\voWfuSy.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\voWfuSy" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA98A.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe"C:\Users\Admin\AppData\Local\Temp\9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe"C:\Users\Admin\AppData\Local\Temp\9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Data" /tr '"C:\Users\Admin\AppData\Roaming\Data.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Data" /tr '"C:\Users\Admin\AppData\Roaming\Data.exe"'4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpBF06.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\Data.exe"C:\Users\Admin\AppData\Roaming\Data.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\voWfuSy.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\voWfuSy" /XML "C:\Users\Admin\AppData\Local\Temp\tmp66CF.tmp"5⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Data.exe"C:\Users\Admin\AppData\Roaming\Data.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5.exe.logMD5
b1a97e7c826ffc38c8d2c00eb49b8a01
SHA12d094c94fbcecd045370b1470fe77d10128ccac4
SHA256c7c76581c6e385d9b79c074273d3335fe2d0bd3880e2dee2b64dd2f9f3106944
SHA512ed4e770718235213d5c54ff8966b87cdb37fc392ae5abe1eb8d8dd6a8832cf8a28a33dc10d3c582cf480853c41a6680401e6f2acab473548f5cb30a8e1b8965f
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Data.exe.logMD5
b1a97e7c826ffc38c8d2c00eb49b8a01
SHA12d094c94fbcecd045370b1470fe77d10128ccac4
SHA256c7c76581c6e385d9b79c074273d3335fe2d0bd3880e2dee2b64dd2f9f3106944
SHA512ed4e770718235213d5c54ff8966b87cdb37fc392ae5abe1eb8d8dd6a8832cf8a28a33dc10d3c582cf480853c41a6680401e6f2acab473548f5cb30a8e1b8965f
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
a978add4212f80b5b00c3101780cb3fd
SHA1fae244889d8b63c456e9e3db441abffaa8591b2b
SHA256e2598192b61100090c5179c3d2c2cdd375631e83dafeb929d31cf90e92181b30
SHA5124ae97ed6ad176393706e6dd4a2704df2bf3ec1c71fbc325ef25aaa916eb747c6c7d0e8d39c5e3aedfbeb6224862cb56bcad85147fb47f2dfa29cb9092888549f
-
C:\Users\Admin\AppData\Local\Temp\tmp66CF.tmpMD5
19b1ee69e7ac810f6d8cdb1d74cf81dd
SHA175cfa7aa808953a13d970c5c9eca83d08e3e1931
SHA2564d9acdc88e7bb06f992f99707fda84ea5f4d18b3d6480b16c661cfe221a36290
SHA51233bc02b6c187639ef3bf8567453feae54488c0a78035bdcd18586788ee68d449acea3b55aff9953d0490af795c5b9675273bcf0b63e9180dd6fbd04e467631e3
-
C:\Users\Admin\AppData\Local\Temp\tmpA98A.tmpMD5
19b1ee69e7ac810f6d8cdb1d74cf81dd
SHA175cfa7aa808953a13d970c5c9eca83d08e3e1931
SHA2564d9acdc88e7bb06f992f99707fda84ea5f4d18b3d6480b16c661cfe221a36290
SHA51233bc02b6c187639ef3bf8567453feae54488c0a78035bdcd18586788ee68d449acea3b55aff9953d0490af795c5b9675273bcf0b63e9180dd6fbd04e467631e3
-
C:\Users\Admin\AppData\Local\Temp\tmpBF06.tmp.batMD5
23cccf5649e53fd412fd69db8b79e353
SHA182c7e5ce4eafcc0b39c081b0661b07dc75927cf9
SHA256e09d7842f5f1ab5b258159470be2b18ee3ac1df3e7edf425fa56495949bfcbdd
SHA512f5e1c609d03e82b99083f636eb1c835a184bd1a8fd9d90fb52ccaa5fb959162565269b74bcf6be63ec90f0a0c27f0a69da6ce52f3e9d88e887351b9ca3c66ecb
-
C:\Users\Admin\AppData\Roaming\Data.exeMD5
935e022330708967113c88e15f8b01c3
SHA17cf14b3324d826a0fed00f66a282ea7c9b9b14eb
SHA2569b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5
SHA512362939a7d6ce2f7ddc71a5af3d9e5b8d9505a8f12578258d358351057b008d63a4d22e8d53308632874293b66973292cc73868aa6f13bf995b40753c2d9c70ca
-
C:\Users\Admin\AppData\Roaming\Data.exeMD5
935e022330708967113c88e15f8b01c3
SHA17cf14b3324d826a0fed00f66a282ea7c9b9b14eb
SHA2569b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5
SHA512362939a7d6ce2f7ddc71a5af3d9e5b8d9505a8f12578258d358351057b008d63a4d22e8d53308632874293b66973292cc73868aa6f13bf995b40753c2d9c70ca
-
C:\Users\Admin\AppData\Roaming\Data.exeMD5
935e022330708967113c88e15f8b01c3
SHA17cf14b3324d826a0fed00f66a282ea7c9b9b14eb
SHA2569b3f9a9609fd1a9bb141ebe88098b9b40a9dd031f88e2f8ba9745a6969e03ed5
SHA512362939a7d6ce2f7ddc71a5af3d9e5b8d9505a8f12578258d358351057b008d63a4d22e8d53308632874293b66973292cc73868aa6f13bf995b40753c2d9c70ca
-
memory/1184-135-0x0000000007F70000-0x00000000082C0000-memory.dmpFilesize
3.3MB
-
memory/1184-150-0x00000000094A0000-0x00000000094BE000-memory.dmpFilesize
120KB
-
memory/1184-129-0x0000000006FD0000-0x0000000006FD1000-memory.dmpFilesize
4KB
-
memory/1184-130-0x0000000007610000-0x0000000007C38000-memory.dmpFilesize
6.2MB
-
memory/1184-131-0x0000000006FD2000-0x0000000006FD3000-memory.dmpFilesize
4KB
-
memory/1184-132-0x0000000007570000-0x0000000007592000-memory.dmpFilesize
136KB
-
memory/1184-148-0x00000000094C0000-0x00000000094F3000-memory.dmpFilesize
204KB
-
memory/1184-134-0x0000000007F00000-0x0000000007F66000-memory.dmpFilesize
408KB
-
memory/1184-126-0x0000000006E80000-0x0000000006EB6000-memory.dmpFilesize
216KB
-
memory/1184-136-0x00000000071B0000-0x00000000071CC000-memory.dmpFilesize
112KB
-
memory/1184-137-0x0000000008460000-0x00000000084AB000-memory.dmpFilesize
300KB
-
memory/1184-138-0x00000000086B0000-0x0000000008726000-memory.dmpFilesize
472KB
-
memory/1184-360-0x0000000009970000-0x0000000009978000-memory.dmpFilesize
32KB
-
memory/1184-133-0x0000000007C40000-0x0000000007CA6000-memory.dmpFilesize
408KB
-
memory/1184-355-0x0000000009980000-0x000000000999A000-memory.dmpFilesize
104KB
-
memory/1184-227-0x0000000006FD3000-0x0000000006FD4000-memory.dmpFilesize
4KB
-
memory/1184-158-0x00000000099F0000-0x0000000009A84000-memory.dmpFilesize
592KB
-
memory/1184-156-0x0000000009810000-0x00000000098B5000-memory.dmpFilesize
660KB
-
memory/1184-157-0x000000007E600000-0x000000007E601000-memory.dmpFilesize
4KB
-
memory/1856-607-0x00000000058A0000-0x00000000058A1000-memory.dmpFilesize
4KB
-
memory/2476-122-0x0000000008F80000-0x0000000008FCB000-memory.dmpFilesize
300KB
-
memory/2476-115-0x0000000000CF0000-0x0000000000D40000-memory.dmpFilesize
320KB
-
memory/2476-121-0x0000000005800000-0x000000000580E000-memory.dmpFilesize
56KB
-
memory/2476-120-0x0000000005690000-0x0000000005B8E000-memory.dmpFilesize
5.0MB
-
memory/2476-119-0x0000000005810000-0x00000000058AC000-memory.dmpFilesize
624KB
-
memory/2476-123-0x0000000009020000-0x0000000009058000-memory.dmpFilesize
224KB
-
memory/2476-118-0x0000000005560000-0x000000000556A000-memory.dmpFilesize
40KB
-
memory/2476-117-0x0000000005590000-0x0000000005622000-memory.dmpFilesize
584KB
-
memory/2476-116-0x0000000005B90000-0x000000000608E000-memory.dmpFilesize
5.0MB
-
memory/3132-385-0x0000000000BE2000-0x0000000000BE3000-memory.dmpFilesize
4KB
-
memory/3132-383-0x0000000000BE0000-0x0000000000BE1000-memory.dmpFilesize
4KB
-
memory/3132-436-0x0000000000BE3000-0x0000000000BE4000-memory.dmpFilesize
4KB
-
memory/3132-434-0x000000007E740000-0x000000007E741000-memory.dmpFilesize
4KB
-
memory/3664-285-0x0000000004AE0000-0x0000000004FDE000-memory.dmpFilesize
5.0MB
-
memory/3984-128-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/3984-139-0x0000000002EA0000-0x0000000002EA1000-memory.dmpFilesize
4KB