Analysis
-
max time kernel
300s -
max time network
265s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
21-05-2022 10:15
Static task
static1
Behavioral task
behavioral1
Sample
6b33c7f2f55f0589987b58fde7a9552c21273ea07e4d593893b80d8ebc77627e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
6b33c7f2f55f0589987b58fde7a9552c21273ea07e4d593893b80d8ebc77627e.exe
Resource
win10-20220414-en
General
-
Target
6b33c7f2f55f0589987b58fde7a9552c21273ea07e4d593893b80d8ebc77627e.exe
-
Size
71KB
-
MD5
5f6e646c0ccb6fe1db72d48b92fb1095
-
SHA1
79a60cbb9c12284d34e561f0afe2b246be3e4cf4
-
SHA256
6b33c7f2f55f0589987b58fde7a9552c21273ea07e4d593893b80d8ebc77627e
-
SHA512
93500c8f70c40ca576eb3b0b970087b3f0ab477925f6e70ee31544d7663ef2bf53da607c6f53d75c6916177a8ac8af45d7c7171fa53c80500616f344af8205ec
Malware Config
Signatures
-
XMRig Miner Payload 1 IoCs
Processes:
resource yara_rule C:\ProgramData\Dllhost\winlogson.exe xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
dllhost.exewinlogson.exepid process 4996 dllhost.exe 4668 winlogson.exe -
Adds Run key to start application 2 TTPs 9 IoCs
Processes:
dllhost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe / file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1804997378-2045782378-3882459628-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4784 schtasks.exe 5072 schtasks.exe 4256 schtasks.exe 3792 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6b33c7f2f55f0589987b58fde7a9552c21273ea07e4d593893b80d8ebc77627e.exepowershell.exepowershell.exedllhost.exepid process 2656 6b33c7f2f55f0589987b58fde7a9552c21273ea07e4d593893b80d8ebc77627e.exe 4868 powershell.exe 4868 powershell.exe 4868 powershell.exe 4120 powershell.exe 4120 powershell.exe 4120 powershell.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe 4996 dllhost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 644 -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
6b33c7f2f55f0589987b58fde7a9552c21273ea07e4d593893b80d8ebc77627e.exepowershell.exepowershell.exedllhost.exewinlogson.exedescription pid process Token: SeDebugPrivilege 2656 6b33c7f2f55f0589987b58fde7a9552c21273ea07e4d593893b80d8ebc77627e.exe Token: SeDebugPrivilege 4868 powershell.exe Token: SeDebugPrivilege 4120 powershell.exe Token: SeDebugPrivilege 4996 dllhost.exe Token: SeLockMemoryPrivilege 4668 winlogson.exe Token: SeLockMemoryPrivilege 4668 winlogson.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
winlogson.exepid process 4668 winlogson.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6b33c7f2f55f0589987b58fde7a9552c21273ea07e4d593893b80d8ebc77627e.execmd.exedllhost.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2656 wrote to memory of 2956 2656 6b33c7f2f55f0589987b58fde7a9552c21273ea07e4d593893b80d8ebc77627e.exe cmd.exe PID 2656 wrote to memory of 2956 2656 6b33c7f2f55f0589987b58fde7a9552c21273ea07e4d593893b80d8ebc77627e.exe cmd.exe PID 2656 wrote to memory of 2956 2656 6b33c7f2f55f0589987b58fde7a9552c21273ea07e4d593893b80d8ebc77627e.exe cmd.exe PID 2956 wrote to memory of 4676 2956 cmd.exe chcp.com PID 2956 wrote to memory of 4676 2956 cmd.exe chcp.com PID 2956 wrote to memory of 4676 2956 cmd.exe chcp.com PID 2956 wrote to memory of 4868 2956 cmd.exe powershell.exe PID 2956 wrote to memory of 4868 2956 cmd.exe powershell.exe PID 2956 wrote to memory of 4868 2956 cmd.exe powershell.exe PID 2956 wrote to memory of 4120 2956 cmd.exe powershell.exe PID 2956 wrote to memory of 4120 2956 cmd.exe powershell.exe PID 2956 wrote to memory of 4120 2956 cmd.exe powershell.exe PID 2656 wrote to memory of 4996 2656 6b33c7f2f55f0589987b58fde7a9552c21273ea07e4d593893b80d8ebc77627e.exe dllhost.exe PID 2656 wrote to memory of 4996 2656 6b33c7f2f55f0589987b58fde7a9552c21273ea07e4d593893b80d8ebc77627e.exe dllhost.exe PID 2656 wrote to memory of 4996 2656 6b33c7f2f55f0589987b58fde7a9552c21273ea07e4d593893b80d8ebc77627e.exe dllhost.exe PID 4996 wrote to memory of 816 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 816 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 816 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 412 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 412 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 412 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 1256 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 1256 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 1256 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 872 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 872 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 872 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 812 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 812 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 812 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 4192 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 4192 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 4192 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 192 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 192 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 192 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 4004 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 4004 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 4004 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 1132 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 1132 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 1132 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 664 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 664 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 664 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 2464 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 2464 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 2464 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 2480 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 2480 4996 dllhost.exe cmd.exe PID 4996 wrote to memory of 2480 4996 dllhost.exe cmd.exe PID 816 wrote to memory of 4784 816 cmd.exe schtasks.exe PID 816 wrote to memory of 4784 816 cmd.exe schtasks.exe PID 816 wrote to memory of 4784 816 cmd.exe schtasks.exe PID 872 wrote to memory of 5072 872 cmd.exe schtasks.exe PID 872 wrote to memory of 5072 872 cmd.exe schtasks.exe PID 872 wrote to memory of 5072 872 cmd.exe schtasks.exe PID 412 wrote to memory of 4256 412 cmd.exe schtasks.exe PID 412 wrote to memory of 4256 412 cmd.exe schtasks.exe PID 412 wrote to memory of 4256 412 cmd.exe schtasks.exe PID 812 wrote to memory of 3792 812 cmd.exe schtasks.exe PID 812 wrote to memory of 3792 812 cmd.exe schtasks.exe PID 812 wrote to memory of 3792 812 cmd.exe schtasks.exe PID 4996 wrote to memory of 1352 4996 dllhost.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b33c7f2f55f0589987b58fde7a9552c21273ea07e4d593893b80d8ebc77627e.exe"C:\Users\Admin\AppData\Local\Temp\6b33c7f2f55f0589987b58fde7a9552c21273ea07e4d593893b80d8ebc77627e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\SystemData"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 12513⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk4523" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk1885" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk2064" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2074" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json3⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe -c config.json3⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵
-
C:\ProgramData\Dllhost\winlogson.exeC:\ProgramData\Dllhost\winlogson.exe -c config.json4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Dllhost\dllhost.exeFilesize
80KB
MD595ee6687b1ff58db76e540c95e2dcbfd
SHA1c534d60704d491ba5cf38993970bb7ed79fffcf3
SHA2567a087e9902d901c61ba1299c399b225e3c7d0584c849172aafed72ecd4989a9c
SHA512982609ae770a0c3d8063b960074e19a9ae2379de0f2e599144d73effabb8696fe4bfd0ff3756f450a3a1da0fd511c93d8f6456c394b875c1a56055861780fd79
-
C:\ProgramData\Dllhost\dllhost.exeFilesize
80KB
MD595ee6687b1ff58db76e540c95e2dcbfd
SHA1c534d60704d491ba5cf38993970bb7ed79fffcf3
SHA2567a087e9902d901c61ba1299c399b225e3c7d0584c849172aafed72ecd4989a9c
SHA512982609ae770a0c3d8063b960074e19a9ae2379de0f2e599144d73effabb8696fe4bfd0ff3756f450a3a1da0fd511c93d8f6456c394b875c1a56055861780fd79
-
C:\ProgramData\Dllhost\winlogson.exeFilesize
7.9MB
MD5ae6c92c8073b1239390369d3ed93538f
SHA1a76ea83bdcfa472cd593363e9bb254df494a5577
SHA256d8d0e8ce7d532250713c7ac9c3e3d144463ce9f47bbf5bd6fc3bb939c739c1a0
SHA51259de08ea3849243addb3b6aaa2b3ebf71a271eee77239bea0dd190d446a6eec56fd7c5b4fa3668c14074f33f06ab1f011baa0ac2266f6d2d33eb59847841c350
-
C:\ProgramData\SystemFiles\config.jsonFilesize
305B
MD5f1acc99c85a24a7d40db1229db5041dc
SHA160144a1cb84ac74594a11e7a67386cec3b7d1a97
SHA256a0dc27c9fd7355f2eed1216bc4be2ddbbd52618cdc60df35f04c682b633d81da
SHA512fa137566868c99be0c15b9de9060c92cb7e3b04f8ee923ead98ccefc48a8ef10ad4963b74f17672cde5d20a6cd21e627444cb59f048f5554bd182a57666aa57e
-
C:\ProgramData\SystemFiles\sys_rh.binFilesize
1KB
MD501b835563bb1b0e35a7687545885b710
SHA1cd43aea0c4d3a8cf86a539c523c581f61cfc63de
SHA2565243547138d42d4294ecb25422e28ca0d5cd99adf2655590d4f38c74b26ec035
SHA51224412924242d0a5ab3e5bcc6ed6333329b1729ce96360318e006db8e1180cee9b54089b77f5f826056db4fb40486e8ff79307f62e9ca3d840c197c02cd6cb4e6
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD51454e897ddf45b2b384382c178748a69
SHA19ee9be6f0c64e73a7b4219cda7cde3181d4b1088
SHA256088e5a1081248ba5b9feeaffbbec69aeef50fde330960a46879d1ab635f6eef2
SHA51203b4723e13ad0389a4836aaa8a87618cab365e6c1160580d34080715bdf46b5ca3fed29351d213344aede92c5933aff858692291579707b18ca6806adf5e4342
-
memory/192-752-0x0000000000000000-mapping.dmp
-
memory/412-728-0x0000000000000000-mapping.dmp
-
memory/664-769-0x0000000000000000-mapping.dmp
-
memory/812-740-0x0000000000000000-mapping.dmp
-
memory/816-726-0x0000000000000000-mapping.dmp
-
memory/872-735-0x0000000000000000-mapping.dmp
-
memory/1132-764-0x0000000000000000-mapping.dmp
-
memory/1256-732-0x0000000000000000-mapping.dmp
-
memory/1352-1010-0x0000000000000000-mapping.dmp
-
memory/2464-775-0x0000000000000000-mapping.dmp
-
memory/2480-783-0x0000000000000000-mapping.dmp
-
memory/2656-148-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-187-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-138-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-139-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-140-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-141-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-142-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-143-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-144-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-145-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-146-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-147-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-118-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-149-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-150-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-151-0x00000000000D0000-0x00000000000E8000-memory.dmpFilesize
96KB
-
memory/2656-152-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-153-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-154-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-155-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-156-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-157-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-158-0x0000000002410000-0x0000000002416000-memory.dmpFilesize
24KB
-
memory/2656-159-0x000000000A3B0000-0x000000000A8AE000-memory.dmpFilesize
5.0MB
-
memory/2656-160-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-161-0x0000000009EB0000-0x0000000009F42000-memory.dmpFilesize
584KB
-
memory/2656-162-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-163-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-164-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-165-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-166-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-167-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-168-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-169-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-170-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-171-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-172-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-173-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-174-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-175-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-176-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-177-0x0000000004990000-0x000000000499A000-memory.dmpFilesize
40KB
-
memory/2656-178-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-179-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-180-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-181-0x000000000A320000-0x000000000A386000-memory.dmpFilesize
408KB
-
memory/2656-182-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-183-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-184-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-185-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-186-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-137-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-119-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-120-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-121-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-122-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-123-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-124-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-125-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-126-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-127-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-128-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-129-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-130-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-131-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-132-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-133-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-134-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-135-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2656-136-0x00000000773B0000-0x000000007753E000-memory.dmpFilesize
1.6MB
-
memory/2956-190-0x0000000000000000-mapping.dmp
-
memory/3684-1032-0x0000000000000000-mapping.dmp
-
memory/3792-851-0x0000000000000000-mapping.dmp
-
memory/3848-1114-0x0000000000000000-mapping.dmp
-
memory/4004-758-0x0000000000000000-mapping.dmp
-
memory/4120-551-0x0000000000000000-mapping.dmp
-
memory/4192-746-0x0000000000000000-mapping.dmp
-
memory/4256-835-0x0000000000000000-mapping.dmp
-
memory/4636-1120-0x0000000000000000-mapping.dmp
-
memory/4668-1133-0x000001E43F600000-0x000001E43F640000-memory.dmpFilesize
256KB
-
memory/4668-1134-0x000001E43F640000-0x000001E43F660000-memory.dmpFilesize
128KB
-
memory/4668-1129-0x0000000000000000-mapping.dmp
-
memory/4676-196-0x0000000000000000-mapping.dmp
-
memory/4784-824-0x0000000000000000-mapping.dmp
-
memory/4868-312-0x00000000098E0000-0x00000000098FE000-memory.dmpFilesize
120KB
-
memory/4868-240-0x0000000007090000-0x00000000070C6000-memory.dmpFilesize
216KB
-
memory/4868-266-0x0000000008250000-0x00000000085A0000-memory.dmpFilesize
3.3MB
-
memory/4868-263-0x0000000007DC0000-0x0000000007DE2000-memory.dmpFilesize
136KB
-
memory/4868-245-0x0000000007720000-0x0000000007D48000-memory.dmpFilesize
6.2MB
-
memory/4868-269-0x0000000007F30000-0x0000000007F4C000-memory.dmpFilesize
112KB
-
memory/4868-533-0x00000000073B0000-0x00000000073B8000-memory.dmpFilesize
32KB
-
memory/4868-270-0x0000000008860000-0x00000000088AB000-memory.dmpFilesize
300KB
-
memory/4868-274-0x0000000008790000-0x0000000008806000-memory.dmpFilesize
472KB
-
memory/4868-265-0x0000000007E60000-0x0000000007EC6000-memory.dmpFilesize
408KB
-
memory/4868-204-0x0000000000000000-mapping.dmp
-
memory/4868-311-0x0000000009900000-0x0000000009933000-memory.dmpFilesize
204KB
-
memory/4868-321-0x0000000009940000-0x00000000099E5000-memory.dmpFilesize
660KB
-
memory/4868-528-0x0000000009BC0000-0x0000000009BDA000-memory.dmpFilesize
104KB
-
memory/4868-325-0x0000000009BE0000-0x0000000009C74000-memory.dmpFilesize
592KB
-
memory/4996-664-0x00000000000E0000-0x00000000000FA000-memory.dmpFilesize
104KB
-
memory/4996-679-0x0000000002310000-0x0000000002316000-memory.dmpFilesize
24KB
-
memory/4996-616-0x0000000000000000-mapping.dmp
-
memory/5072-826-0x0000000000000000-mapping.dmp