Analysis
-
max time kernel
140s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 18:29
Static task
static1
Behavioral task
behavioral1
Sample
afcd19bfc8c7d2e14b896774c2bc4c37.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
afcd19bfc8c7d2e14b896774c2bc4c37.exe
Resource
win10v2004-20220414-en
General
-
Target
afcd19bfc8c7d2e14b896774c2bc4c37.exe
-
Size
571KB
-
MD5
afcd19bfc8c7d2e14b896774c2bc4c37
-
SHA1
e25f7298d5f0f8e241c9c7a5af34e643685ce6bd
-
SHA256
0107796696a369ff65f7156be554659e8cba137cdf4af78da7daac9362820737
-
SHA512
cb196072de8942d28535a8afb66223855308933936d774310eeabea822f3ec894112281c9d5477a1b0f31e6bae55bc1b2b4f665120c83bf2494449ea348dc88f
Malware Config
Extracted
asyncrat
1.0.7
Nigatex
nigatex.ml:25565
huieqwgehqweqduia
-
delay
1
-
install
false
-
install_file
MpCopyAccelerator.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4392-135-0x0000000000300000-0x0000000000312000-memory.dmp asyncrat -
Executes dropped EXE 5 IoCs
Processes:
nvcontainer.exectfmon32.exenvcontainer.exenvcontainer.exenvcontainer.exepid process 2632 nvcontainer.exe 4012 ctfmon32.exe 2116 nvcontainer.exe 2960 nvcontainer.exe 4876 nvcontainer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
nvcontainer.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation nvcontainer.exe Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation WScript.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
nvcontainer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\nvcontainer = "\"C:\\Users\\Admin\\AppData\\Roaming\\nvcontainer.exe\"" nvcontainer.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
afcd19bfc8c7d2e14b896774c2bc4c37.exectfmon32.exenvcontainer.exenvcontainer.exedescription pid process target process PID 3572 set thread context of 4392 3572 afcd19bfc8c7d2e14b896774c2bc4c37.exe vbc.exe PID 4012 set thread context of 60 4012 ctfmon32.exe vbc.exe PID 2632 set thread context of 2116 2632 nvcontainer.exe nvcontainer.exe PID 2960 set thread context of 4876 2960 nvcontainer.exe nvcontainer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2416 schtasks.exe 1372 schtasks.exe 3556 schtasks.exe 4416 schtasks.exe -
Modifies registry class 1 IoCs
Processes:
nvcontainer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000_Classes\Local Settings nvcontainer.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exevbc.exepowershell.exenvcontainer.exepid process 1960 powershell.exe 4392 vbc.exe 1960 powershell.exe 3144 powershell.exe 3144 powershell.exe 2116 nvcontainer.exe 2116 nvcontainer.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
afcd19bfc8c7d2e14b896774c2bc4c37.exevbc.exepowershell.exectfmon32.exenvcontainer.exenvcontainer.exepowershell.exenvcontainer.exedescription pid process Token: SeDebugPrivilege 3572 afcd19bfc8c7d2e14b896774c2bc4c37.exe Token: SeDebugPrivilege 4392 vbc.exe Token: SeDebugPrivilege 1960 powershell.exe Token: SeDebugPrivilege 4012 ctfmon32.exe Token: SeDebugPrivilege 2632 nvcontainer.exe Token: SeDebugPrivilege 2116 nvcontainer.exe Token: SeDebugPrivilege 3144 powershell.exe Token: SeDebugPrivilege 2960 nvcontainer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
afcd19bfc8c7d2e14b896774c2bc4c37.execmd.exevbc.execmd.exepowershell.exectfmon32.execmd.exenvcontainer.execmd.exenvcontainer.exeWScript.exenvcontainer.exedescription pid process target process PID 3572 wrote to memory of 4392 3572 afcd19bfc8c7d2e14b896774c2bc4c37.exe vbc.exe PID 3572 wrote to memory of 4392 3572 afcd19bfc8c7d2e14b896774c2bc4c37.exe vbc.exe PID 3572 wrote to memory of 4392 3572 afcd19bfc8c7d2e14b896774c2bc4c37.exe vbc.exe PID 3572 wrote to memory of 4392 3572 afcd19bfc8c7d2e14b896774c2bc4c37.exe vbc.exe PID 3572 wrote to memory of 4392 3572 afcd19bfc8c7d2e14b896774c2bc4c37.exe vbc.exe PID 3572 wrote to memory of 4392 3572 afcd19bfc8c7d2e14b896774c2bc4c37.exe vbc.exe PID 3572 wrote to memory of 4392 3572 afcd19bfc8c7d2e14b896774c2bc4c37.exe vbc.exe PID 3572 wrote to memory of 4392 3572 afcd19bfc8c7d2e14b896774c2bc4c37.exe vbc.exe PID 3572 wrote to memory of 3164 3572 afcd19bfc8c7d2e14b896774c2bc4c37.exe cmd.exe PID 3572 wrote to memory of 3164 3572 afcd19bfc8c7d2e14b896774c2bc4c37.exe cmd.exe PID 3572 wrote to memory of 3164 3572 afcd19bfc8c7d2e14b896774c2bc4c37.exe cmd.exe PID 3164 wrote to memory of 2416 3164 cmd.exe schtasks.exe PID 3164 wrote to memory of 2416 3164 cmd.exe schtasks.exe PID 3164 wrote to memory of 2416 3164 cmd.exe schtasks.exe PID 3572 wrote to memory of 320 3572 afcd19bfc8c7d2e14b896774c2bc4c37.exe cmd.exe PID 3572 wrote to memory of 320 3572 afcd19bfc8c7d2e14b896774c2bc4c37.exe cmd.exe PID 3572 wrote to memory of 320 3572 afcd19bfc8c7d2e14b896774c2bc4c37.exe cmd.exe PID 4392 wrote to memory of 3348 4392 vbc.exe cmd.exe PID 4392 wrote to memory of 3348 4392 vbc.exe cmd.exe PID 4392 wrote to memory of 3348 4392 vbc.exe cmd.exe PID 3348 wrote to memory of 1960 3348 cmd.exe powershell.exe PID 3348 wrote to memory of 1960 3348 cmd.exe powershell.exe PID 3348 wrote to memory of 1960 3348 cmd.exe powershell.exe PID 1960 wrote to memory of 2632 1960 powershell.exe nvcontainer.exe PID 1960 wrote to memory of 2632 1960 powershell.exe nvcontainer.exe PID 4012 wrote to memory of 60 4012 ctfmon32.exe vbc.exe PID 4012 wrote to memory of 60 4012 ctfmon32.exe vbc.exe PID 4012 wrote to memory of 60 4012 ctfmon32.exe vbc.exe PID 4012 wrote to memory of 60 4012 ctfmon32.exe vbc.exe PID 4012 wrote to memory of 60 4012 ctfmon32.exe vbc.exe PID 4012 wrote to memory of 60 4012 ctfmon32.exe vbc.exe PID 4012 wrote to memory of 60 4012 ctfmon32.exe vbc.exe PID 4012 wrote to memory of 60 4012 ctfmon32.exe vbc.exe PID 4012 wrote to memory of 4224 4012 ctfmon32.exe cmd.exe PID 4012 wrote to memory of 4224 4012 ctfmon32.exe cmd.exe PID 4012 wrote to memory of 4224 4012 ctfmon32.exe cmd.exe PID 4224 wrote to memory of 1372 4224 cmd.exe schtasks.exe PID 4224 wrote to memory of 1372 4224 cmd.exe schtasks.exe PID 4224 wrote to memory of 1372 4224 cmd.exe schtasks.exe PID 4012 wrote to memory of 3172 4012 ctfmon32.exe cmd.exe PID 4012 wrote to memory of 3172 4012 ctfmon32.exe cmd.exe PID 4012 wrote to memory of 3172 4012 ctfmon32.exe cmd.exe PID 2632 wrote to memory of 2116 2632 nvcontainer.exe nvcontainer.exe PID 2632 wrote to memory of 2116 2632 nvcontainer.exe nvcontainer.exe PID 2632 wrote to memory of 2116 2632 nvcontainer.exe nvcontainer.exe PID 2632 wrote to memory of 2116 2632 nvcontainer.exe nvcontainer.exe PID 2632 wrote to memory of 2116 2632 nvcontainer.exe nvcontainer.exe PID 2632 wrote to memory of 2116 2632 nvcontainer.exe nvcontainer.exe PID 2632 wrote to memory of 4536 2632 nvcontainer.exe cmd.exe PID 2632 wrote to memory of 4536 2632 nvcontainer.exe cmd.exe PID 4536 wrote to memory of 3556 4536 cmd.exe schtasks.exe PID 4536 wrote to memory of 3556 4536 cmd.exe schtasks.exe PID 2632 wrote to memory of 4400 2632 nvcontainer.exe cmd.exe PID 2632 wrote to memory of 4400 2632 nvcontainer.exe cmd.exe PID 2116 wrote to memory of 3812 2116 nvcontainer.exe WScript.exe PID 2116 wrote to memory of 3812 2116 nvcontainer.exe WScript.exe PID 3812 wrote to memory of 3144 3812 WScript.exe powershell.exe PID 3812 wrote to memory of 3144 3812 WScript.exe powershell.exe PID 2960 wrote to memory of 4876 2960 nvcontainer.exe nvcontainer.exe PID 2960 wrote to memory of 4876 2960 nvcontainer.exe nvcontainer.exe PID 2960 wrote to memory of 4876 2960 nvcontainer.exe nvcontainer.exe PID 2960 wrote to memory of 4876 2960 nvcontainer.exe nvcontainer.exe PID 2960 wrote to memory of 4876 2960 nvcontainer.exe nvcontainer.exe PID 2960 wrote to memory of 4876 2960 nvcontainer.exe nvcontainer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\afcd19bfc8c7d2e14b896774c2bc4c37.exe"C:\Users\Admin\AppData\Local\Temp\afcd19bfc8c7d2e14b896774c2bc4c37.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\nvcontainer.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\nvcontainer.exe"'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\nvcontainer.exe"C:\Users\Admin\AppData\Local\Temp\nvcontainer.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\nvcontainer.exeC:\Users\Admin\AppData\Local\Temp\nvcontainer.exe6⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\koYrP.vbs"7⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\8⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\nvcontainer\nvcontainer.exe'" /f6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\nvcontainer\nvcontainer.exe'" /f7⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\nvcontainer.exe" "C:\Users\Admin\AppData\Roaming\nvcontainer\nvcontainer.exe"6⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\ctfmon32\ctfmon32.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\ctfmon32\ctfmon32.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Local\Temp\afcd19bfc8c7d2e14b896774c2bc4c37.exe" "C:\Users\Admin\AppData\Roaming\ctfmon32\ctfmon32.exe"2⤵
-
C:\Users\Admin\AppData\Roaming\ctfmon32\ctfmon32.exeC:\Users\Admin\AppData\Roaming\ctfmon32\ctfmon32.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\ctfmon32\ctfmon32.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\ctfmon32\ctfmon32.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Roaming\ctfmon32\ctfmon32.exe" "C:\Users\Admin\AppData\Roaming\ctfmon32\ctfmon32.exe"2⤵
-
C:\Users\Admin\AppData\Roaming\nvcontainer\nvcontainer.exeC:\Users\Admin\AppData\Roaming\nvcontainer\nvcontainer.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\nvcontainer\nvcontainer.exeC:\Users\Admin\AppData\Roaming\nvcontainer\nvcontainer.exe2⤵
- Executes dropped EXE
-
C:\Windows\system32\cmd.exe"cmd.exe" /C schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\nvcontainer\nvcontainer.exe'" /f2⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\nvcontainer\nvcontainer.exe'" /f3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.exe"cmd.exe" /C copy "C:\Users\Admin\AppData\Roaming\nvcontainer\nvcontainer.exe" "C:\Users\Admin\AppData\Roaming\nvcontainer\nvcontainer.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\nvcontainer.exe.logFilesize
1KB
MD54de0e77d535f3cb568442a6af4546a62
SHA1d6b0507582d6c1a1c8811b02a29197fbb0ac1432
SHA256913af39d6fd885c4495c7616e5d23629a44a61e33a6edc6f2ca5523ec701b9f2
SHA512e3974c19ac3173889f5678564bf1d502e6dcab3b47a4e17c33f3f74973345f3ba0297778e53e8a7cd650bb78a34bf96da8ef9b623956879a3e809f43665838cf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5c08d3cdd7a149f8b7bb94d1543b8224a
SHA1270770b2bcd15823f05885872b1ee451f0ddbb61
SHA256926d322627591e1868d98abf79787ab599e5f60f9d75ed0227d8742d0f566e54
SHA5120d8a962915f0ffe81d23fa3db8f07934b0e7d9ab693991ad1a58a9442ee035f89ecb54a1bd21cbced6f1d006aed37e14ed8d3a24baa35ba4e20716fa5197161f
-
C:\Users\Admin\AppData\Local\Temp\koYrP.vbsFilesize
92B
MD54b13abd262e6f452b680b7c404285a32
SHA1a5b55774c48678a82ab377a7d23a00ec6a174dea
SHA256e09b4b2ffbca61fbfaa017d9a6c7c60ec4242bfc468bf2f58887e79c97966eff
SHA5128dc590452e549d1dbb582e6552e5cfe960adeb43987435b67d6d1f18d3ff44e7be01f638a7f62f7f47da561303fdc5203ca4412639662f170b6e0022e3ae6bc8
-
C:\Users\Admin\AppData\Local\Temp\nvcontainer.exeFilesize
300.0MB
MD5e407c7a0f100ef58922d20b19e4e8c35
SHA1f7972f88dcec0b023fec33cb1b36e7fca5ec83e9
SHA256da8f0aeae9a1ba45e7ac2f6a8fa31133ead466e88ea46a7f715fb29864fc1eb9
SHA51272c9e6435b3f56da010aca568d9065283efee6cbb33896a70655cab254c853747692d5ca027cbcf846983fcb2451dad7fd4da944f201156ea6eea2fcc93899d9
-
C:\Users\Admin\AppData\Local\Temp\nvcontainer.exeFilesize
300.0MB
MD5e407c7a0f100ef58922d20b19e4e8c35
SHA1f7972f88dcec0b023fec33cb1b36e7fca5ec83e9
SHA256da8f0aeae9a1ba45e7ac2f6a8fa31133ead466e88ea46a7f715fb29864fc1eb9
SHA51272c9e6435b3f56da010aca568d9065283efee6cbb33896a70655cab254c853747692d5ca027cbcf846983fcb2451dad7fd4da944f201156ea6eea2fcc93899d9
-
C:\Users\Admin\AppData\Local\Temp\nvcontainer.exeFilesize
300.0MB
MD5e407c7a0f100ef58922d20b19e4e8c35
SHA1f7972f88dcec0b023fec33cb1b36e7fca5ec83e9
SHA256da8f0aeae9a1ba45e7ac2f6a8fa31133ead466e88ea46a7f715fb29864fc1eb9
SHA51272c9e6435b3f56da010aca568d9065283efee6cbb33896a70655cab254c853747692d5ca027cbcf846983fcb2451dad7fd4da944f201156ea6eea2fcc93899d9
-
C:\Users\Admin\AppData\Roaming\ctfmon32\ctfmon32.exeFilesize
571KB
MD5afcd19bfc8c7d2e14b896774c2bc4c37
SHA1e25f7298d5f0f8e241c9c7a5af34e643685ce6bd
SHA2560107796696a369ff65f7156be554659e8cba137cdf4af78da7daac9362820737
SHA512cb196072de8942d28535a8afb66223855308933936d774310eeabea822f3ec894112281c9d5477a1b0f31e6bae55bc1b2b4f665120c83bf2494449ea348dc88f
-
C:\Users\Admin\AppData\Roaming\ctfmon32\ctfmon32.exeFilesize
571KB
MD5afcd19bfc8c7d2e14b896774c2bc4c37
SHA1e25f7298d5f0f8e241c9c7a5af34e643685ce6bd
SHA2560107796696a369ff65f7156be554659e8cba137cdf4af78da7daac9362820737
SHA512cb196072de8942d28535a8afb66223855308933936d774310eeabea822f3ec894112281c9d5477a1b0f31e6bae55bc1b2b4f665120c83bf2494449ea348dc88f
-
C:\Users\Admin\AppData\Roaming\nvcontainer\nvcontainer.exeFilesize
190.0MB
MD53a2cd04b52f4c8de2fd937095bcbf4bf
SHA11c8874673d316d30e292189f8285a438175b0cf6
SHA2566e63ca205cbcb0891e17d205d9a121444b4e726456338ff417fb50d4f66f5754
SHA51267a701834aeab41e0907c666cfa507ab6d29dfe2a81818a91d1a5d55a38a3ddd093dd6025f0a6d6ad97dfdebccaff4043ba6de2387e09b38e19fbaead953f6ff
-
C:\Users\Admin\AppData\Roaming\nvcontainer\nvcontainer.exeFilesize
188.9MB
MD5453dccbe42df38e50a9fc82805670875
SHA105f0bd7cffd1656db15c8604a130c3afdbfa607c
SHA256229df0785091df32b6c8e30490779a22f8487f8c0be2d9f75e7aaa406db40cbf
SHA51281c568387f8562802e6e948e4a8e1e55b6eff477680d6d0e5cae3cc773aa22c81364456b1835c73af3f4d9d097a858a185c8ec7f942ae076a3e4158ab78a9ad9
-
C:\Users\Admin\AppData\Roaming\nvcontainer\nvcontainer.exeFilesize
86.9MB
MD54187fd10c2018aae03f47885edabe097
SHA12d43728419d763fe6bcce0531ddc2ca33063a67c
SHA2564a3b11e9466ea1a357fd55286382afb7fc6de9ece753fd29385494e5eeea6852
SHA51243c36bbd69944a1582cedaa1bfe2d0c14b33af88c67e7171a06199e7a07c0f1fadd6028c84d8103feb5097b5ff1a91806e9786214eb37d2c1d564227d7b4c7b3
-
memory/60-160-0x0000000000000000-mapping.dmp
-
memory/220-192-0x0000000000000000-mapping.dmp
-
memory/320-138-0x0000000000000000-mapping.dmp
-
memory/1372-163-0x0000000000000000-mapping.dmp
-
memory/1960-148-0x0000000006030000-0x000000000604E000-memory.dmpFilesize
120KB
-
memory/1960-144-0x0000000002730000-0x0000000002766000-memory.dmpFilesize
216KB
-
memory/1960-147-0x00000000059A0000-0x0000000005A06000-memory.dmpFilesize
408KB
-
memory/1960-146-0x0000000005900000-0x0000000005922000-memory.dmpFilesize
136KB
-
memory/1960-149-0x0000000007040000-0x00000000070D6000-memory.dmpFilesize
600KB
-
memory/1960-150-0x0000000006510000-0x000000000652A000-memory.dmpFilesize
104KB
-
memory/1960-151-0x0000000006560000-0x0000000006582000-memory.dmpFilesize
136KB
-
memory/1960-145-0x0000000005210000-0x0000000005838000-memory.dmpFilesize
6.2MB
-
memory/1960-143-0x0000000000000000-mapping.dmp
-
memory/2116-174-0x00007FF8D67B0000-0x00007FF8D7271000-memory.dmpFilesize
10.8MB
-
memory/2116-165-0x0000000140000000-0x000000014009A000-memory.dmpFilesize
616KB
-
memory/2116-166-0x0000000140000000-mapping.dmp
-
memory/2116-172-0x00007FF8D67B0000-0x00007FF8D7271000-memory.dmpFilesize
10.8MB
-
memory/2416-137-0x0000000000000000-mapping.dmp
-
memory/2632-153-0x0000000000000000-mapping.dmp
-
memory/2632-173-0x00007FF8D67B0000-0x00007FF8D7271000-memory.dmpFilesize
10.8MB
-
memory/2632-155-0x00007FF6D6AD0000-0x00007FF6D6BC6000-memory.dmpFilesize
984KB
-
memory/2632-156-0x00007FF8D67B0000-0x00007FF8D7271000-memory.dmpFilesize
10.8MB
-
memory/2632-168-0x00007FF8D67B0000-0x00007FF8D7271000-memory.dmpFilesize
10.8MB
-
memory/2960-185-0x00007FF775AC0000-0x00007FF775BB6000-memory.dmpFilesize
984KB
-
memory/2960-186-0x00007FF8D67B0000-0x00007FF8D7271000-memory.dmpFilesize
10.8MB
-
memory/2960-193-0x00007FF8D67B0000-0x00007FF8D7271000-memory.dmpFilesize
10.8MB
-
memory/3000-190-0x0000000000000000-mapping.dmp
-
memory/3144-177-0x0000000000000000-mapping.dmp
-
memory/3144-178-0x0000019EBC6F0000-0x0000019EBC712000-memory.dmpFilesize
136KB
-
memory/3144-181-0x00007FF8D67B0000-0x00007FF8D7271000-memory.dmpFilesize
10.8MB
-
memory/3144-180-0x00007FF8D67B0000-0x00007FF8D7271000-memory.dmpFilesize
10.8MB
-
memory/3164-136-0x0000000000000000-mapping.dmp
-
memory/3172-164-0x0000000000000000-mapping.dmp
-
memory/3348-142-0x0000000000000000-mapping.dmp
-
memory/3556-170-0x0000000000000000-mapping.dmp
-
memory/3572-130-0x0000000001000000-0x0000000001050000-memory.dmpFilesize
320KB
-
memory/3572-132-0x00000000052A0000-0x0000000005844000-memory.dmpFilesize
5.6MB
-
memory/3572-131-0x0000000004BB0000-0x0000000004C16000-memory.dmpFilesize
408KB
-
memory/3812-175-0x0000000000000000-mapping.dmp
-
memory/4012-159-0x0000000000E80000-0x0000000000ED0000-memory.dmpFilesize
320KB
-
memory/4224-162-0x0000000000000000-mapping.dmp
-
memory/4392-141-0x0000000006580000-0x000000000659E000-memory.dmpFilesize
120KB
-
memory/4392-139-0x0000000005370000-0x000000000540C000-memory.dmpFilesize
624KB
-
memory/4392-140-0x00000000065B0000-0x0000000006626000-memory.dmpFilesize
472KB
-
memory/4392-135-0x0000000000300000-0x0000000000312000-memory.dmpFilesize
72KB
-
memory/4392-134-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/4392-133-0x0000000000000000-mapping.dmp
-
memory/4400-171-0x0000000000000000-mapping.dmp
-
memory/4416-191-0x0000000000000000-mapping.dmp
-
memory/4536-169-0x0000000000000000-mapping.dmp
-
memory/4876-188-0x0000000140000000-mapping.dmp
-
memory/4876-194-0x00007FF8D67B0000-0x00007FF8D7271000-memory.dmpFilesize
10.8MB