Analysis
-
max time kernel
154s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 03:38
Static task
static1
Behavioral task
behavioral1
Sample
DEBT_07854_06162020.vbs
Resource
win7-20220414-en
General
-
Target
DEBT_07854_06162020.vbs
-
Size
2.6MB
-
MD5
66222018f11f64892cf65efeaade4e51
-
SHA1
c9a4282e5ba84aaeb136bf47b8ae04185f32af86
-
SHA256
116905c43d121cc4e1fdaa9ef2e89bb2f83a4c89b5fb400024f94c5cb06b9b09
-
SHA512
1b1fe70395a322e8e7450e881cda37a58ff614146f1f7e66346b4e13bddad66c1a1f7b5f3f7c2aa81e6e58d1379fe9f00eb1f481250fba4af2c6015814e18980
Malware Config
Extracted
qakbot
324.142
spx142
1592381263
173.175.29.210:443
201.248.102.4:2078
182.185.94.24:995
41.97.182.19:443
37.182.238.170:2222
193.248.44.2:2222
188.26.243.186:443
84.247.55.190:443
58.233.220.182:443
82.79.67.68:443
217.162.149.212:443
173.49.122.160:995
117.216.177.27:443
219.92.104.54:443
5.107.220.84:2222
96.41.93.96:443
122.147.204.4:443
117.199.5.99:443
68.60.221.169:465
78.96.192.26:443
78.96.190.54:443
69.11.247.242:443
207.255.161.8:32100
68.204.164.222:443
82.81.172.21:443
78.97.145.242:443
216.163.4.132:443
68.190.152.98:443
73.217.4.42:443
76.116.90.159:443
75.110.250.89:443
35.142.12.163:2222
74.134.46.7:443
80.195.103.146:2222
41.34.91.90:995
39.62.15.131:443
70.93.151.141:443
81.245.66.237:995
86.144.150.29:2222
172.242.243.186:443
59.88.168.3:443
73.200.219.143:443
35.143.205.199:443
24.42.14.241:995
98.121.187.78:443
73.78.149.206:443
81.133.234.36:2222
154.56.71.73:443
188.241.243.175:443
77.69.206.106:443
207.255.161.8:32102
69.92.54.95:995
83.110.222.11:443
108.227.161.27:995
74.222.204.82:443
74.135.37.79:443
187.155.74.5:443
80.14.209.42:2222
24.44.180.236:2222
74.75.216.202:443
24.43.22.220:993
108.188.116.179:443
100.4.173.223:443
70.95.118.217:443
134.0.196.46:995
68.225.56.31:443
140.82.21.191:443
110.142.29.212:443
72.36.59.46:2222
207.162.184.228:443
59.26.204.210:443
108.39.93.45:443
97.93.211.17:443
24.122.228.88:443
72.132.249.144:995
72.16.212.108:465
47.153.115.154:993
47.153.115.154:443
66.222.88.126:995
72.204.242.138:53
203.198.96.69:443
72.29.181.77:2078
67.83.54.76:2222
2.50.171.142:443
24.122.157.93:443
47.146.169.85:443
174.34.67.106:2222
122.147.204.4:995
82.77.169.118:2222
178.221.64.104:995
77.237.181.168:995
86.126.97.183:2222
76.111.128.194:443
67.209.195.198:3389
72.190.101.70:443
74.56.167.31:443
24.42.14.241:443
5.193.61.212:2222
5.15.81.52:443
24.201.79.208:2078
94.52.160.116:443
188.192.75.8:995
208.82.44.203:443
207.255.161.8:443
67.170.137.8:443
62.38.111.70:2222
24.164.79.147:443
70.183.127.6:995
185.246.9.69:995
67.165.206.193:995
50.104.68.223:443
211.24.72.253:443
184.180.157.203:2222
173.245.152.231:443
95.77.223.148:443
68.4.137.211:443
71.88.168.176:443
5.13.68.129:443
199.250.149.110:443
47.153.115.154:465
98.115.138.61:443
79.117.243.157:443
201.215.29.153:443
189.231.198.212:443
188.27.6.170:443
24.43.22.220:995
92.17.167.87:2222
24.43.22.220:443
72.209.191.27:443
72.204.242.138:80
78.101.142.240:443
72.204.242.138:443
71.187.170.235:443
96.56.237.174:32103
71.187.7.239:443
184.98.104.7:995
137.99.224.198:443
151.205.102.42:443
98.32.60.217:443
64.224.76.152:443
72.204.242.138:32100
76.170.77.99:443
70.174.3.241:443
96.37.137.42:443
47.153.115.154:995
203.33.138.230:443
175.141.238.131:443
36.77.151.211:443
78.101.133.124:443
Signatures
-
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Churchill.exe cryptone C:\Users\Admin\AppData\Local\Temp\Churchill.exe cryptone C:\Users\Admin\AppData\Local\Temp\Churchill.exe cryptone C:\Users\Admin\AppData\Roaming\Microsoft\Labheyfch\ckopiwu.exe cryptone C:\Users\Admin\AppData\Roaming\Microsoft\Labheyfch\ckopiwu.exe cryptone C:\Users\Admin\AppData\Roaming\Microsoft\Labheyfch\ckopiwu.exe cryptone C:\Users\Admin\AppData\Local\Temp\Churchill.exe cryptone C:\Users\Admin\AppData\Roaming\Microsoft\Labheyfch\ckopiwu.exe cryptone -
Blocklisted process makes network request 2 IoCs
Processes:
WScript.exeflow pid process 7 2452 WScript.exe 10 2452 WScript.exe -
Executes dropped EXE 6 IoCs
Processes:
Churchill.exeChurchill.execkopiwu.execkopiwu.exeChurchill.execkopiwu.exepid process 2496 Churchill.exe 4612 Churchill.exe 4652 ckopiwu.exe 5044 ckopiwu.exe 1256 Churchill.exe 932 ckopiwu.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation WScript.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
ckopiwu.exeChurchill.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 ckopiwu.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service ckopiwu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 Churchill.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\DeviceDesc Churchill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 Churchill.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc Churchill.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Service Churchill.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service Churchill.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\DeviceDesc ckopiwu.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Service ckopiwu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 ckopiwu.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc ckopiwu.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
Churchill.exeChurchill.execkopiwu.execkopiwu.exeexplorer.exeChurchill.exepid process 2496 Churchill.exe 2496 Churchill.exe 4612 Churchill.exe 4612 Churchill.exe 4612 Churchill.exe 4612 Churchill.exe 4652 ckopiwu.exe 4652 ckopiwu.exe 5044 ckopiwu.exe 5044 ckopiwu.exe 5044 ckopiwu.exe 5044 ckopiwu.exe 4368 explorer.exe 4368 explorer.exe 4368 explorer.exe 4368 explorer.exe 1256 Churchill.exe 1256 Churchill.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
ckopiwu.exepid process 4652 ckopiwu.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
WScript.exepid process 2452 WScript.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
Churchill.execkopiwu.exeChurchill.exedescription pid process target process PID 2496 wrote to memory of 4612 2496 Churchill.exe Churchill.exe PID 2496 wrote to memory of 4612 2496 Churchill.exe Churchill.exe PID 2496 wrote to memory of 4612 2496 Churchill.exe Churchill.exe PID 2496 wrote to memory of 4652 2496 Churchill.exe ckopiwu.exe PID 2496 wrote to memory of 4652 2496 Churchill.exe ckopiwu.exe PID 2496 wrote to memory of 4652 2496 Churchill.exe ckopiwu.exe PID 2496 wrote to memory of 4128 2496 Churchill.exe schtasks.exe PID 2496 wrote to memory of 4128 2496 Churchill.exe schtasks.exe PID 2496 wrote to memory of 4128 2496 Churchill.exe schtasks.exe PID 4652 wrote to memory of 5044 4652 ckopiwu.exe ckopiwu.exe PID 4652 wrote to memory of 5044 4652 ckopiwu.exe ckopiwu.exe PID 4652 wrote to memory of 5044 4652 ckopiwu.exe ckopiwu.exe PID 4652 wrote to memory of 4368 4652 ckopiwu.exe explorer.exe PID 4652 wrote to memory of 4368 4652 ckopiwu.exe explorer.exe PID 4652 wrote to memory of 4368 4652 ckopiwu.exe explorer.exe PID 4652 wrote to memory of 4368 4652 ckopiwu.exe explorer.exe PID 1256 wrote to memory of 3112 1256 Churchill.exe reg.exe PID 1256 wrote to memory of 3112 1256 Churchill.exe reg.exe PID 1256 wrote to memory of 3624 1256 Churchill.exe reg.exe PID 1256 wrote to memory of 3624 1256 Churchill.exe reg.exe PID 1256 wrote to memory of 3384 1256 Churchill.exe reg.exe PID 1256 wrote to memory of 3384 1256 Churchill.exe reg.exe PID 1256 wrote to memory of 3312 1256 Churchill.exe reg.exe PID 1256 wrote to memory of 3312 1256 Churchill.exe reg.exe PID 1256 wrote to memory of 1296 1256 Churchill.exe reg.exe PID 1256 wrote to memory of 1296 1256 Churchill.exe reg.exe PID 1256 wrote to memory of 2036 1256 Churchill.exe reg.exe PID 1256 wrote to memory of 2036 1256 Churchill.exe reg.exe PID 1256 wrote to memory of 2676 1256 Churchill.exe reg.exe PID 1256 wrote to memory of 2676 1256 Churchill.exe reg.exe PID 1256 wrote to memory of 3588 1256 Churchill.exe reg.exe PID 1256 wrote to memory of 3588 1256 Churchill.exe reg.exe PID 1256 wrote to memory of 608 1256 Churchill.exe reg.exe PID 1256 wrote to memory of 608 1256 Churchill.exe reg.exe PID 1256 wrote to memory of 932 1256 Churchill.exe ckopiwu.exe PID 1256 wrote to memory of 932 1256 Churchill.exe ckopiwu.exe PID 1256 wrote to memory of 932 1256 Churchill.exe ckopiwu.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\DEBT_07854_06162020.vbs"1⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\Churchill.exeC:\Users\Admin\AppData\Local\Temp\Churchill.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Churchill.exeC:\Users\Admin\AppData\Local\Temp\Churchill.exe /C2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Microsoft\Labheyfch\ckopiwu.exeC:\Users\Admin\AppData\Roaming\Microsoft\Labheyfch\ckopiwu.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Labheyfch\ckopiwu.exeC:\Users\Admin\AppData\Roaming\Microsoft\Labheyfch\ckopiwu.exe /C3⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn aqiicwfafb /tr "\"C:\Users\Admin\AppData\Local\Temp\Churchill.exe\" /I aqiicwfafb" /SC ONCE /Z /ST 07:24 /ET 07:362⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\Churchill.exeC:\Users\Admin\AppData\Local\Temp\Churchill.exe /I aqiicwfafb1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Spynet" /f /t REG_DWORD /v "SubmitSamplesConsent" /d "2"2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Labheyfch" /d "0"2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Labheyfch\ckopiwu.exeC:\Users\Admin\AppData\Roaming\Microsoft\Labheyfch\ckopiwu.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Churchill.exeFilesize
2.6MB
MD55004555240fa78e8e49483e33f7550c0
SHA14d51367638800728b94af5ba0b6d364c407c7773
SHA256382ae412ae682c0c1241c2bbafec413b0f9bb5829a68ec199399dcb38e9cf05c
SHA512874d12561cb2164309e8916fe54bed93d0166d8c738cde87244a99280200dd8663a25282a6bf812f116ef8f5de75c5f8e9cbc8c7fba0e6197ebe09b5e695fa60
-
C:\Users\Admin\AppData\Local\Temp\Churchill.exeFilesize
2.6MB
MD55004555240fa78e8e49483e33f7550c0
SHA14d51367638800728b94af5ba0b6d364c407c7773
SHA256382ae412ae682c0c1241c2bbafec413b0f9bb5829a68ec199399dcb38e9cf05c
SHA512874d12561cb2164309e8916fe54bed93d0166d8c738cde87244a99280200dd8663a25282a6bf812f116ef8f5de75c5f8e9cbc8c7fba0e6197ebe09b5e695fa60
-
C:\Users\Admin\AppData\Local\Temp\Churchill.exeFilesize
2.6MB
MD55004555240fa78e8e49483e33f7550c0
SHA14d51367638800728b94af5ba0b6d364c407c7773
SHA256382ae412ae682c0c1241c2bbafec413b0f9bb5829a68ec199399dcb38e9cf05c
SHA512874d12561cb2164309e8916fe54bed93d0166d8c738cde87244a99280200dd8663a25282a6bf812f116ef8f5de75c5f8e9cbc8c7fba0e6197ebe09b5e695fa60
-
C:\Users\Admin\AppData\Local\Temp\Churchill.exeFilesize
2.6MB
MD55004555240fa78e8e49483e33f7550c0
SHA14d51367638800728b94af5ba0b6d364c407c7773
SHA256382ae412ae682c0c1241c2bbafec413b0f9bb5829a68ec199399dcb38e9cf05c
SHA512874d12561cb2164309e8916fe54bed93d0166d8c738cde87244a99280200dd8663a25282a6bf812f116ef8f5de75c5f8e9cbc8c7fba0e6197ebe09b5e695fa60
-
C:\Users\Admin\AppData\Roaming\Microsoft\Labheyfch\ckopiwu.datFilesize
63B
MD55f2d0366efd91406867ba846553b6a80
SHA1b11dc6ab38e9f9ce867f5b020102fb29d065e258
SHA256c7d19dab170099c50a50df54a791cf5b82c40b28d005ec3b248d702eac27340d
SHA5125ea180303529428c9e809f844a67691fe1537fd4dbf26c640294122a03fd18ae81ed6fa54246fe2f5de59da999411487f38e5fc9715087d0e2cabb04af526d30
-
C:\Users\Admin\AppData\Roaming\Microsoft\Labheyfch\ckopiwu.exeFilesize
2.6MB
MD55004555240fa78e8e49483e33f7550c0
SHA14d51367638800728b94af5ba0b6d364c407c7773
SHA256382ae412ae682c0c1241c2bbafec413b0f9bb5829a68ec199399dcb38e9cf05c
SHA512874d12561cb2164309e8916fe54bed93d0166d8c738cde87244a99280200dd8663a25282a6bf812f116ef8f5de75c5f8e9cbc8c7fba0e6197ebe09b5e695fa60
-
C:\Users\Admin\AppData\Roaming\Microsoft\Labheyfch\ckopiwu.exeFilesize
2.6MB
MD55004555240fa78e8e49483e33f7550c0
SHA14d51367638800728b94af5ba0b6d364c407c7773
SHA256382ae412ae682c0c1241c2bbafec413b0f9bb5829a68ec199399dcb38e9cf05c
SHA512874d12561cb2164309e8916fe54bed93d0166d8c738cde87244a99280200dd8663a25282a6bf812f116ef8f5de75c5f8e9cbc8c7fba0e6197ebe09b5e695fa60
-
C:\Users\Admin\AppData\Roaming\Microsoft\Labheyfch\ckopiwu.exeFilesize
2.6MB
MD55004555240fa78e8e49483e33f7550c0
SHA14d51367638800728b94af5ba0b6d364c407c7773
SHA256382ae412ae682c0c1241c2bbafec413b0f9bb5829a68ec199399dcb38e9cf05c
SHA512874d12561cb2164309e8916fe54bed93d0166d8c738cde87244a99280200dd8663a25282a6bf812f116ef8f5de75c5f8e9cbc8c7fba0e6197ebe09b5e695fa60
-
C:\Users\Admin\AppData\Roaming\Microsoft\Labheyfch\ckopiwu.exeFilesize
2.6MB
MD55004555240fa78e8e49483e33f7550c0
SHA14d51367638800728b94af5ba0b6d364c407c7773
SHA256382ae412ae682c0c1241c2bbafec413b0f9bb5829a68ec199399dcb38e9cf05c
SHA512874d12561cb2164309e8916fe54bed93d0166d8c738cde87244a99280200dd8663a25282a6bf812f116ef8f5de75c5f8e9cbc8c7fba0e6197ebe09b5e695fa60
-
memory/608-159-0x0000000000000000-mapping.dmp
-
memory/932-160-0x0000000000000000-mapping.dmp
-
memory/1256-150-0x0000000000400000-0x00000000006A8000-memory.dmpFilesize
2.7MB
-
memory/1296-155-0x0000000000000000-mapping.dmp
-
memory/2036-156-0x0000000000000000-mapping.dmp
-
memory/2496-133-0x0000000000400000-0x00000000006A8000-memory.dmpFilesize
2.7MB
-
memory/2496-132-0x0000000000950000-0x0000000000987000-memory.dmpFilesize
220KB
-
memory/2676-157-0x0000000000000000-mapping.dmp
-
memory/3112-151-0x0000000000000000-mapping.dmp
-
memory/3312-154-0x0000000000000000-mapping.dmp
-
memory/3384-153-0x0000000000000000-mapping.dmp
-
memory/3588-158-0x0000000000000000-mapping.dmp
-
memory/3624-152-0x0000000000000000-mapping.dmp
-
memory/4128-140-0x0000000000000000-mapping.dmp
-
memory/4368-147-0x0000000000D80000-0x0000000000DB3000-memory.dmpFilesize
204KB
-
memory/4368-145-0x0000000000000000-mapping.dmp
-
memory/4368-146-0x0000000000360000-0x000000000039A000-memory.dmpFilesize
232KB
-
memory/4612-136-0x0000000000400000-0x00000000006A8000-memory.dmpFilesize
2.7MB
-
memory/4612-134-0x0000000000000000-mapping.dmp
-
memory/4652-141-0x0000000000400000-0x00000000006A8000-memory.dmpFilesize
2.7MB
-
memory/4652-137-0x0000000000000000-mapping.dmp
-
memory/5044-144-0x0000000000400000-0x00000000006A8000-memory.dmpFilesize
2.7MB
-
memory/5044-142-0x0000000000000000-mapping.dmp