Analysis
-
max time kernel
132s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 03:34
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER .exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
NEW ORDER .exe
Resource
win10v2004-20220414-en
General
-
Target
NEW ORDER .exe
-
Size
709KB
-
MD5
e6f2ef791f0ec1869a975fa14248e8a1
-
SHA1
bca1cf7d10b095100273065d9e59fd1107afd353
-
SHA256
c77b479ead371d060f45186dc10d6bb2c9d32aac0275de27fab94b2f65a54500
-
SHA512
247b507bb4073e1a89f7078812ab993831923691cf6b40962b0685d96205281472f183b00ce122cd59a979fb3b45152a2a5bdb168de9d368ba2c1994c32a082b
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\19E979543A\Log.txt
masslogger
Extracted
C:\Users\Admin\AppData\Local\Temp\19E979543A\Log.txt
masslogger
Extracted
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
billions@cairoways.me - Password:
Whyworry90#
Extracted
C:\Users\Admin\AppData\Local\Temp\19E979543A\Log.txt
masslogger
Signatures
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger log file 3 IoCs
Detects a log file produced by MassLogger.
Processes:
yara_rule masslogger_log_file masslogger_log_file C:\Users\Admin\AppData\Local\Temp\19E979543A\Log.txt masslogger_log_file -
Executes dropped EXE 3 IoCs
Processes:
vlc.exevlc.exevlc.exepid process 4756 vlc.exe 3940 vlc.exe 4960 vlc.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
vlc.exevlc.exeNEW ORDER .exeNEW ORDER .exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation vlc.exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation vlc.exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation NEW ORDER .exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation NEW ORDER .exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 18 IoCs
Processes:
vlc.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vlc.exe Key queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook vlc.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vlc.exe Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vlc.exe Key queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vlc.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vlc.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook vlc.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook vlc.exe Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vlc.exe Key queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook vlc.exe Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vlc.exe Key queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vlc.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook vlc.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vlc.exe Key queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vlc.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vlc.exe Key queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook vlc.exe Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vlc.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 25 api.ipify.org 31 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
Processes:
NEW ORDER .exevlc.exedescription pid process target process PID 3484 set thread context of 2032 3484 NEW ORDER .exe NEW ORDER .exe PID 4756 set thread context of 4960 4756 vlc.exe vlc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 2364 schtasks.exe 4528 schtasks.exe 5112 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4976 timeout.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 4960 vlc.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
NEW ORDER .exeNEW ORDER .exevlc.exevlc.exepid process 3484 NEW ORDER .exe 3484 NEW ORDER .exe 3484 NEW ORDER .exe 3484 NEW ORDER .exe 2032 NEW ORDER .exe 2032 NEW ORDER .exe 2032 NEW ORDER .exe 2032 NEW ORDER .exe 2032 NEW ORDER .exe 2032 NEW ORDER .exe 2032 NEW ORDER .exe 2032 NEW ORDER .exe 2032 NEW ORDER .exe 2032 NEW ORDER .exe 2032 NEW ORDER .exe 2032 NEW ORDER .exe 2032 NEW ORDER .exe 2032 NEW ORDER .exe 2032 NEW ORDER .exe 2032 NEW ORDER .exe 2032 NEW ORDER .exe 2032 NEW ORDER .exe 2032 NEW ORDER .exe 2032 NEW ORDER .exe 2032 NEW ORDER .exe 4756 vlc.exe 4756 vlc.exe 4960 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
NEW ORDER .exeNEW ORDER .exevlc.exevlc.exedescription pid process Token: SeDebugPrivilege 3484 NEW ORDER .exe Token: SeDebugPrivilege 2032 NEW ORDER .exe Token: SeDebugPrivilege 4756 vlc.exe Token: SeDebugPrivilege 4960 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
vlc.exepid process 4960 vlc.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
NEW ORDER .exeNEW ORDER .execmd.execmd.exevlc.exedescription pid process target process PID 3484 wrote to memory of 4528 3484 NEW ORDER .exe schtasks.exe PID 3484 wrote to memory of 4528 3484 NEW ORDER .exe schtasks.exe PID 3484 wrote to memory of 4528 3484 NEW ORDER .exe schtasks.exe PID 3484 wrote to memory of 3460 3484 NEW ORDER .exe NEW ORDER .exe PID 3484 wrote to memory of 3460 3484 NEW ORDER .exe NEW ORDER .exe PID 3484 wrote to memory of 3460 3484 NEW ORDER .exe NEW ORDER .exe PID 3484 wrote to memory of 5116 3484 NEW ORDER .exe NEW ORDER .exe PID 3484 wrote to memory of 5116 3484 NEW ORDER .exe NEW ORDER .exe PID 3484 wrote to memory of 5116 3484 NEW ORDER .exe NEW ORDER .exe PID 3484 wrote to memory of 2032 3484 NEW ORDER .exe NEW ORDER .exe PID 3484 wrote to memory of 2032 3484 NEW ORDER .exe NEW ORDER .exe PID 3484 wrote to memory of 2032 3484 NEW ORDER .exe NEW ORDER .exe PID 3484 wrote to memory of 2032 3484 NEW ORDER .exe NEW ORDER .exe PID 3484 wrote to memory of 2032 3484 NEW ORDER .exe NEW ORDER .exe PID 3484 wrote to memory of 2032 3484 NEW ORDER .exe NEW ORDER .exe PID 3484 wrote to memory of 2032 3484 NEW ORDER .exe NEW ORDER .exe PID 3484 wrote to memory of 2032 3484 NEW ORDER .exe NEW ORDER .exe PID 2032 wrote to memory of 3576 2032 NEW ORDER .exe cmd.exe PID 2032 wrote to memory of 3576 2032 NEW ORDER .exe cmd.exe PID 2032 wrote to memory of 3576 2032 NEW ORDER .exe cmd.exe PID 2032 wrote to memory of 3924 2032 NEW ORDER .exe cmd.exe PID 2032 wrote to memory of 3924 2032 NEW ORDER .exe cmd.exe PID 2032 wrote to memory of 3924 2032 NEW ORDER .exe cmd.exe PID 3576 wrote to memory of 5112 3576 cmd.exe schtasks.exe PID 3576 wrote to memory of 5112 3576 cmd.exe schtasks.exe PID 3576 wrote to memory of 5112 3576 cmd.exe schtasks.exe PID 3924 wrote to memory of 4976 3924 cmd.exe timeout.exe PID 3924 wrote to memory of 4976 3924 cmd.exe timeout.exe PID 3924 wrote to memory of 4976 3924 cmd.exe timeout.exe PID 3924 wrote to memory of 4756 3924 cmd.exe vlc.exe PID 3924 wrote to memory of 4756 3924 cmd.exe vlc.exe PID 3924 wrote to memory of 4756 3924 cmd.exe vlc.exe PID 4756 wrote to memory of 2364 4756 vlc.exe schtasks.exe PID 4756 wrote to memory of 2364 4756 vlc.exe schtasks.exe PID 4756 wrote to memory of 2364 4756 vlc.exe schtasks.exe PID 4756 wrote to memory of 3940 4756 vlc.exe vlc.exe PID 4756 wrote to memory of 3940 4756 vlc.exe vlc.exe PID 4756 wrote to memory of 3940 4756 vlc.exe vlc.exe PID 4756 wrote to memory of 4960 4756 vlc.exe vlc.exe PID 4756 wrote to memory of 4960 4756 vlc.exe vlc.exe PID 4756 wrote to memory of 4960 4756 vlc.exe vlc.exe PID 4756 wrote to memory of 4960 4756 vlc.exe vlc.exe PID 4756 wrote to memory of 4960 4756 vlc.exe vlc.exe PID 4756 wrote to memory of 4960 4756 vlc.exe vlc.exe PID 4756 wrote to memory of 4960 4756 vlc.exe vlc.exe PID 4756 wrote to memory of 4960 4756 vlc.exe vlc.exe -
outlook_office_path 1 IoCs
Processes:
vlc.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vlc.exe -
outlook_win_path 1 IoCs
Processes:
vlc.exedescription ioc process Key queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 vlc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEW ORDER .exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER .exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IapdeqiYxjrvsQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB99.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\NEW ORDER .exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER .exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\NEW ORDER .exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER .exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\NEW ORDER .exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER .exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn vlc.exe /tr '"C:\Users\Admin\AppData\Roaming\VideoLAN\vlc.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn vlc.exe /tr '"C:\Users\Admin\AppData\Roaming\VideoLAN\vlc.exe"'4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpAAF5.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\VideoLAN\vlc.exe"C:\Users\Admin\AppData\Roaming\VideoLAN\vlc.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IapdeqiYxjrvsQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB779.tmp"5⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\VideoLAN\vlc.exe"C:\Users\Admin\AppData\Roaming\VideoLAN\vlc.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\VideoLAN\vlc.exe"C:\Users\Admin\AppData\Roaming\VideoLAN\vlc.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Accesses Microsoft Outlook profiles
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\NEW ORDER .exe.logFilesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vlc.exe.logFilesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
C:\Users\Admin\AppData\Local\Temp\19E979543A\Log.txtFilesize
616B
MD5778aca6268a395ca519edf05ef7ebf66
SHA16a9460effda3d5f02e2445e0f01812fc2fe60456
SHA2567dfec20687e2eee0a7ea24b7c1371cab87e21c6febacf82d104e12bf12203a64
SHA51270967db5040ec24454e18cad007b66e4c2e5dc8c6b80e8fdb5394166ef1a2f78513126cd9f2ff4e5d843d5609e16cddc7e17764c8abb661f9c6bf4e5bc806098
-
C:\Users\Admin\AppData\Local\Temp\tmpAAF5.tmp.batFilesize
156B
MD518fc892a100ff2055e7277e19da9a04d
SHA1b025c65a7fc311c8ec068b286268d554cd46dde9
SHA2562cfbe402d4b49b686515398e5eb689991abba475ea884d6740c711273be9e937
SHA512eeaed1f8e3337114bd7aee1cd0a1c22151d2b2199fdbd3a77fb6085056f6ef37056999f7b189effc72f1aef5cf7988bbb8f961c682b59d5edacf883e8cd23f0f
-
C:\Users\Admin\AppData\Local\Temp\tmpB779.tmpFilesize
1KB
MD504c33888a157708c2a0ad52d9ddfad53
SHA1a016eebe11e1cb80db8e46ced14f810ffff3ce7f
SHA2561784f131dcb5411b85b06ba1cba60e6bab81895a552db04cd7fab3e7af406b09
SHA512040bbd69bf21c8163969d107e33a8fd9524e28bf3ee512caf4e68cdef73843f02a2f9037147436232e34626cb89b14de202c7b1cc5bcd09f57bee9bb087cffbb
-
C:\Users\Admin\AppData\Local\Temp\tmpB99.tmpFilesize
1KB
MD504c33888a157708c2a0ad52d9ddfad53
SHA1a016eebe11e1cb80db8e46ced14f810ffff3ce7f
SHA2561784f131dcb5411b85b06ba1cba60e6bab81895a552db04cd7fab3e7af406b09
SHA512040bbd69bf21c8163969d107e33a8fd9524e28bf3ee512caf4e68cdef73843f02a2f9037147436232e34626cb89b14de202c7b1cc5bcd09f57bee9bb087cffbb
-
C:\Users\Admin\AppData\Roaming\VideoLAN\vlc.exeFilesize
709KB
MD5e6f2ef791f0ec1869a975fa14248e8a1
SHA1bca1cf7d10b095100273065d9e59fd1107afd353
SHA256c77b479ead371d060f45186dc10d6bb2c9d32aac0275de27fab94b2f65a54500
SHA512247b507bb4073e1a89f7078812ab993831923691cf6b40962b0685d96205281472f183b00ce122cd59a979fb3b45152a2a5bdb168de9d368ba2c1994c32a082b
-
C:\Users\Admin\AppData\Roaming\VideoLAN\vlc.exeFilesize
709KB
MD5e6f2ef791f0ec1869a975fa14248e8a1
SHA1bca1cf7d10b095100273065d9e59fd1107afd353
SHA256c77b479ead371d060f45186dc10d6bb2c9d32aac0275de27fab94b2f65a54500
SHA512247b507bb4073e1a89f7078812ab993831923691cf6b40962b0685d96205281472f183b00ce122cd59a979fb3b45152a2a5bdb168de9d368ba2c1994c32a082b
-
C:\Users\Admin\AppData\Roaming\VideoLAN\vlc.exeFilesize
709KB
MD5e6f2ef791f0ec1869a975fa14248e8a1
SHA1bca1cf7d10b095100273065d9e59fd1107afd353
SHA256c77b479ead371d060f45186dc10d6bb2c9d32aac0275de27fab94b2f65a54500
SHA512247b507bb4073e1a89f7078812ab993831923691cf6b40962b0685d96205281472f183b00ce122cd59a979fb3b45152a2a5bdb168de9d368ba2c1994c32a082b
-
C:\Users\Admin\AppData\Roaming\VideoLAN\vlc.exeFilesize
709KB
MD5e6f2ef791f0ec1869a975fa14248e8a1
SHA1bca1cf7d10b095100273065d9e59fd1107afd353
SHA256c77b479ead371d060f45186dc10d6bb2c9d32aac0275de27fab94b2f65a54500
SHA512247b507bb4073e1a89f7078812ab993831923691cf6b40962b0685d96205281472f183b00ce122cd59a979fb3b45152a2a5bdb168de9d368ba2c1994c32a082b
-
memory/2032-180-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-190-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-144-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-146-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-148-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-150-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-152-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-154-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-156-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-158-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-160-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-162-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-164-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-166-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-168-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-170-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-172-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-174-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-176-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-178-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-139-0x0000000000000000-mapping.dmp
-
memory/2032-182-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-184-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-186-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-188-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-142-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-192-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-194-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-196-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-198-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-200-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-202-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2032-641-0x0000000006B60000-0x0000000006BC6000-memory.dmpFilesize
408KB
-
memory/2032-140-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2364-651-0x0000000000000000-mapping.dmp
-
memory/3460-137-0x0000000000000000-mapping.dmp
-
memory/3484-131-0x0000000005A80000-0x0000000006024000-memory.dmpFilesize
5.6MB
-
memory/3484-130-0x0000000000AE0000-0x0000000000B98000-memory.dmpFilesize
736KB
-
memory/3484-132-0x0000000005570000-0x0000000005602000-memory.dmpFilesize
584KB
-
memory/3484-133-0x0000000005700000-0x000000000570A000-memory.dmpFilesize
40KB
-
memory/3484-134-0x00000000077C0000-0x000000000785C000-memory.dmpFilesize
624KB
-
memory/3576-642-0x0000000000000000-mapping.dmp
-
memory/3924-643-0x0000000000000000-mapping.dmp
-
memory/3940-653-0x0000000000000000-mapping.dmp
-
memory/4528-135-0x0000000000000000-mapping.dmp
-
memory/4756-648-0x0000000000000000-mapping.dmp
-
memory/4960-655-0x0000000000000000-mapping.dmp
-
memory/4960-1159-0x0000000007D30000-0x0000000007D80000-memory.dmpFilesize
320KB
-
memory/4976-647-0x0000000000000000-mapping.dmp
-
memory/5112-645-0x0000000000000000-mapping.dmp
-
memory/5116-138-0x0000000000000000-mapping.dmp