Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
26-05-2022 03:55
Static task
static1
Behavioral task
behavioral1
Sample
SPIER.dfh.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
SPIER.dfh.exe
Resource
win10v2004-20220414-en
General
-
Target
SPIER.dfh.exe
-
Size
971KB
-
MD5
093bd5d66d0c00dd8460371d8a7c6645
-
SHA1
1f4fea0428b350a4ae31b1b77248a74f039e3d22
-
SHA256
6e6e55b8b80a3232b0059f0aab756936505691e6b7472eb5ac7d364f7623c4e1
-
SHA512
11c33dffa91cbc51529002704ca61fc5bf524124cffd5f7325c376c5214012792520bf1d45666f58d868bdc9e4250c8fc4c9afab6eb079de50b746340cfd24fa
Malware Config
Extracted
remcos
RemoteHost
niiarmah.kozow.com:2404
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Updates.exe
-
copy_folder
Updates
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Updates-NESLEV
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Updates
-
take_screenshot_option
false
-
take_screenshot_time
5
- take_screenshot_title
Signatures
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
SPIER.dfh.exeSPIER.dfh.exedescription pid process target process PID 1668 set thread context of 1440 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1440 set thread context of 1748 1440 SPIER.dfh.exe svchost.exe PID 1440 set thread context of 1084 1440 SPIER.dfh.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0913f9eb470d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "360302338" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C2D5F631-DCA7-11EC-917F-6AE7990DC39D} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004863fcdc101a3947b120786fa95ba35b00000000020000000000106600000001000020000000a02038b468b57fd1c365206d0f8650b50e5c751e0dece3b735f71f08dfd5ac91000000000e800000000200002000000089cd1e7d7b5d91215f966df693cfdf3cf4f6ad25439c4a07928182df5dc0de2d20000000ebb085a5725239870f7a8828ddcffae06ab27b3e54176de6c834f51d0aca038c4000000006d3dd930fb049e32f22b44d3addf52cafbc781af2b146b3eae4dc1edb3e5500cdea36b3d84011ec905130783e77761ccedfde574045ccb6e52b8822ad4dd2bb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
SPIER.dfh.exepowershell.exepowershell.exepid process 1668 SPIER.dfh.exe 1168 powershell.exe 2024 powershell.exe 1668 SPIER.dfh.exe 1668 SPIER.dfh.exe 1668 SPIER.dfh.exe 1668 SPIER.dfh.exe 1668 SPIER.dfh.exe 1668 SPIER.dfh.exe 1668 SPIER.dfh.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
SPIER.dfh.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1668 SPIER.dfh.exe Token: SeDebugPrivilege 1168 powershell.exe Token: SeDebugPrivilege 2024 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1092 iexplore.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
SPIER.dfh.exeiexplore.exeIEXPLORE.EXEpid process 1440 SPIER.dfh.exe 1092 iexplore.exe 1092 iexplore.exe 1132 IEXPLORE.EXE 1132 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
SPIER.dfh.exeSPIER.dfh.exesvchost.exeiexplore.exedescription pid process target process PID 1668 wrote to memory of 2024 1668 SPIER.dfh.exe powershell.exe PID 1668 wrote to memory of 2024 1668 SPIER.dfh.exe powershell.exe PID 1668 wrote to memory of 2024 1668 SPIER.dfh.exe powershell.exe PID 1668 wrote to memory of 2024 1668 SPIER.dfh.exe powershell.exe PID 1668 wrote to memory of 1168 1668 SPIER.dfh.exe powershell.exe PID 1668 wrote to memory of 1168 1668 SPIER.dfh.exe powershell.exe PID 1668 wrote to memory of 1168 1668 SPIER.dfh.exe powershell.exe PID 1668 wrote to memory of 1168 1668 SPIER.dfh.exe powershell.exe PID 1668 wrote to memory of 940 1668 SPIER.dfh.exe schtasks.exe PID 1668 wrote to memory of 940 1668 SPIER.dfh.exe schtasks.exe PID 1668 wrote to memory of 940 1668 SPIER.dfh.exe schtasks.exe PID 1668 wrote to memory of 940 1668 SPIER.dfh.exe schtasks.exe PID 1668 wrote to memory of 648 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 648 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 648 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 648 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 624 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 624 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 624 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 624 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 1808 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 1808 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 1808 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 1808 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 1440 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 1440 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 1440 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 1440 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 1440 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 1440 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 1440 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 1440 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 1440 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 1440 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 1440 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 1440 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1668 wrote to memory of 1440 1668 SPIER.dfh.exe SPIER.dfh.exe PID 1440 wrote to memory of 1748 1440 SPIER.dfh.exe svchost.exe PID 1440 wrote to memory of 1748 1440 SPIER.dfh.exe svchost.exe PID 1440 wrote to memory of 1748 1440 SPIER.dfh.exe svchost.exe PID 1440 wrote to memory of 1748 1440 SPIER.dfh.exe svchost.exe PID 1440 wrote to memory of 1748 1440 SPIER.dfh.exe svchost.exe PID 1440 wrote to memory of 1748 1440 SPIER.dfh.exe svchost.exe PID 1440 wrote to memory of 1748 1440 SPIER.dfh.exe svchost.exe PID 1440 wrote to memory of 1748 1440 SPIER.dfh.exe svchost.exe PID 1440 wrote to memory of 1748 1440 SPIER.dfh.exe svchost.exe PID 1748 wrote to memory of 1092 1748 svchost.exe iexplore.exe PID 1748 wrote to memory of 1092 1748 svchost.exe iexplore.exe PID 1748 wrote to memory of 1092 1748 svchost.exe iexplore.exe PID 1748 wrote to memory of 1092 1748 svchost.exe iexplore.exe PID 1440 wrote to memory of 1084 1440 SPIER.dfh.exe svchost.exe PID 1440 wrote to memory of 1084 1440 SPIER.dfh.exe svchost.exe PID 1440 wrote to memory of 1084 1440 SPIER.dfh.exe svchost.exe PID 1440 wrote to memory of 1084 1440 SPIER.dfh.exe svchost.exe PID 1440 wrote to memory of 1084 1440 SPIER.dfh.exe svchost.exe PID 1440 wrote to memory of 1084 1440 SPIER.dfh.exe svchost.exe PID 1440 wrote to memory of 1084 1440 SPIER.dfh.exe svchost.exe PID 1440 wrote to memory of 1084 1440 SPIER.dfh.exe svchost.exe PID 1440 wrote to memory of 1084 1440 SPIER.dfh.exe svchost.exe PID 1092 wrote to memory of 1132 1092 iexplore.exe IEXPLORE.EXE PID 1092 wrote to memory of 1132 1092 iexplore.exe IEXPLORE.EXE PID 1092 wrote to memory of 1132 1092 iexplore.exe IEXPLORE.EXE PID 1092 wrote to memory of 1132 1092 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\SPIER.dfh.exe"C:\Users\Admin\AppData\Local\Temp\SPIER.dfh.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SPIER.dfh.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wEhmRqazZIxbJl.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wEhmRqazZIxbJl" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC9E5.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\SPIER.dfh.exe"C:\Users\Admin\AppData\Local\Temp\SPIER.dfh.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\SPIER.dfh.exe"C:\Users\Admin\AppData\Local\Temp\SPIER.dfh.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\SPIER.dfh.exe"C:\Users\Admin\AppData\Local\Temp\SPIER.dfh.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\SPIER.dfh.exe"C:\Users\Admin\AppData\Local\Temp\SPIER.dfh.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=svchost.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.04⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1092 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
60KB
MD5308336e7f515478969b24c13ded11ede
SHA18fb0cf42b77dbbef224a1e5fc38abc2486320775
SHA256889b832323726a9f10ad03f85562048fdcfe20c9ff6f9d37412cf477b4e92ff9
SHA51261ad97228cd6c3909ef3ac5e4940199971f293bdd0d5eb7916e60469573a44b6287c0fa1e0b6c1389df35eb6c9a7d2a61fdb318d4a886a3821ef5a9dab3ac24f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5774f10f88855af3387bc060480cb3a51
SHA17cdcec37e2f41974be9ad271f491ec363dbe5c80
SHA2566ce171dd5bc1c28b7f0af8574595bfbe0bcff0bb713852ecba77794b68501693
SHA51252fe3c9acd8769f9acc301da53480c1d916abc86e520c2b53c69f83a934848d257db9d1a5c90c5e29879b2a51db79fe8acb7f61f859570cc8d1d0ea86caa9407
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\ezmz917\imagestore.datFilesize
21KB
MD58983e184915a443f7a049978b40ab722
SHA130e2c35eae7a29a09e2ca0164af52817da3b2fc1
SHA2564cb97b7176308c463819707e2fffdd4a9ef7a4297af2438a6e1d0a987206b177
SHA512ae1d8461bd1ef91db41ffd560f779ad88100c2cf61ab89a3018b7174f77addcf1575fcf216892e0651abc285cc72f0eaa30672aa1d6c3ba7f12a3b85c7170344
-
C:\Users\Admin\AppData\Local\Temp\tmpC9E5.tmpFilesize
1KB
MD5adac9449f639dd976561c61fa165f4c0
SHA112a97fddf805dfcbe6b7c51362125f183bd14d70
SHA2568735b81d3f87955c42f63c9c42bbef46fb9e159af09439c5e2ec60934d163557
SHA51293f2b59ce180e9bae9b507487809fa1621a668f217b887f042f20275a48f53e150983bc2bf16def64837107a4e3ddc76a36576298b0cf4ce0458cd5288f1a351
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QLLVCOQA.txtFilesize
606B
MD5ed8354182c652a0c777ee327cad5c56f
SHA15d2a9cbfcdf548003b1358dc2e8adcb8f639c34e
SHA2564d64cc99742ef4d06c98e1454ef99b1fbb0a4bf3c2a034a31cf5a8c5e78774c4
SHA512de05e2f0a83d5bf590d9905ae4cbce39af283defdd93c19f9677d695508243dab454c5e100f3d77241f4da87f206af52b8fe6ca86559e1343dc4286ddbc3df43
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD540f8783dcac8ca8fea8a7e16d9da1be1
SHA18fb82b862c4ed06c94e5e09bfefd83a42ec670a0
SHA256082ca5ea552358f867b167ce9bfd2eb590cbfa4ffbb924b5fa6df082feb4ed32
SHA51287deef77bf2c4e4c3ee0b5629b90b9391c3928ffb1a6ca41f2fd0eea747067e3a89abbf1f32cf567c5094c2772f91172a053185c5618c4f0cf45123adcfee58d
-
memory/940-61-0x0000000000000000-mapping.dmp
-
memory/1084-110-0x0000000000400000-0x00000000004F8000-memory.dmpFilesize
992KB
-
memory/1084-108-0x00000000004F101E-mapping.dmp
-
memory/1168-60-0x0000000000000000-mapping.dmp
-
memory/1168-86-0x000000006EB80000-0x000000006F12B000-memory.dmpFilesize
5.7MB
-
memory/1440-74-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/1440-68-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/1440-70-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/1440-72-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/1440-73-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/1440-67-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/1440-75-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/1440-77-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/1440-80-0x000000000043133D-mapping.dmp
-
memory/1440-79-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/1440-83-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/1440-90-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/1668-66-0x0000000005CC0000-0x0000000005D44000-memory.dmpFilesize
528KB
-
memory/1668-54-0x0000000000020000-0x0000000000118000-memory.dmpFilesize
992KB
-
memory/1668-55-0x0000000075BA1000-0x0000000075BA3000-memory.dmpFilesize
8KB
-
memory/1668-56-0x00000000004E0000-0x00000000004F6000-memory.dmpFilesize
88KB
-
memory/1668-57-0x0000000008130000-0x000000000820A000-memory.dmpFilesize
872KB
-
memory/1668-65-0x0000000002240000-0x0000000002246000-memory.dmpFilesize
24KB
-
memory/1748-97-0x0000000000400000-0x00000000004F8000-memory.dmpFilesize
992KB
-
memory/1748-94-0x0000000000400000-0x00000000004F8000-memory.dmpFilesize
992KB
-
memory/1748-95-0x00000000004F101E-mapping.dmp
-
memory/1748-99-0x0000000000400000-0x00000000004F8000-memory.dmpFilesize
992KB
-
memory/1748-93-0x0000000000400000-0x00000000004F8000-memory.dmpFilesize
992KB
-
memory/1748-87-0x0000000000400000-0x00000000004F8000-memory.dmpFilesize
992KB
-
memory/1748-91-0x0000000000400000-0x00000000004F8000-memory.dmpFilesize
992KB
-
memory/1748-88-0x0000000000400000-0x00000000004F8000-memory.dmpFilesize
992KB
-
memory/2024-85-0x000000006EB80000-0x000000006F12B000-memory.dmpFilesize
5.7MB
-
memory/2024-58-0x0000000000000000-mapping.dmp
-
memory/2024-84-0x000000006EB80000-0x000000006F12B000-memory.dmpFilesize
5.7MB