Analysis
-
max time kernel
63s -
max time network
89s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-07-2022 08:17
Static task
static1
Behavioral task
behavioral1
Sample
3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe
Resource
win10v2004-20220414-en
General
-
Target
3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe
-
Size
613KB
-
MD5
3d354d274bea923b12e3950de7f51eea
-
SHA1
3ca4aec7982bfbf10804685172974148dbca9d8b
-
SHA256
3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2
-
SHA512
083826b7348648de76f9112f347057ab2b99a466eb3b444d8a23074dc54882f9ef279513d33443afad51e9ccd51bc6d7cdcba2e9ec9ddb8beb68c6b5310e2cb9
Malware Config
Extracted
pony
http://al-hadin.com/pony/gate.php
-
payload_url
http://michmetals.info/bin/Myshit.exe
Extracted
njrat
0.7.3
Exploited++
salesxpert.duckdns.org:2889
windows.exe
-
reg_key
windows.exe
-
splitter
mnbvcxz12
Signatures
-
Executes dropped EXE 5 IoCs
Processes:
New Client.exeClient.exewin.exewindows.exewin.exepid process 2356 New Client.exe 4260 Client.exe 4884 win.exe 2116 windows.exe 1344 win.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
New Client.exeClient.exe3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation New Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation Client.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation 3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe -
Drops startup file 2 IoCs
Processes:
windows.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows.exe windows.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\windows.exe windows.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
New Client.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts New Client.exe -
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
New Client.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook New Client.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
WScript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\Run WScript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Registry Key Name = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Windows\\win.vbs -HH" WScript.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
win.exedescription pid process target process PID 4884 set thread context of 1344 4884 win.exe win.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4416 schtasks.exe 4548 schtasks.exe -
Modifies registry class 1 IoCs
Processes:
3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\Local Settings 3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
Client.exepid process 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe 4260 Client.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
Processes:
New Client.exeClient.exewindows.exedescription pid process Token: SeImpersonatePrivilege 2356 New Client.exe Token: SeTcbPrivilege 2356 New Client.exe Token: SeChangeNotifyPrivilege 2356 New Client.exe Token: SeCreateTokenPrivilege 2356 New Client.exe Token: SeBackupPrivilege 2356 New Client.exe Token: SeRestorePrivilege 2356 New Client.exe Token: SeIncreaseQuotaPrivilege 2356 New Client.exe Token: SeAssignPrimaryTokenPrivilege 2356 New Client.exe Token: SeImpersonatePrivilege 2356 New Client.exe Token: SeTcbPrivilege 2356 New Client.exe Token: SeChangeNotifyPrivilege 2356 New Client.exe Token: SeCreateTokenPrivilege 2356 New Client.exe Token: SeBackupPrivilege 2356 New Client.exe Token: SeRestorePrivilege 2356 New Client.exe Token: SeIncreaseQuotaPrivilege 2356 New Client.exe Token: SeAssignPrimaryTokenPrivilege 2356 New Client.exe Token: SeImpersonatePrivilege 2356 New Client.exe Token: SeTcbPrivilege 2356 New Client.exe Token: SeChangeNotifyPrivilege 2356 New Client.exe Token: SeCreateTokenPrivilege 2356 New Client.exe Token: SeBackupPrivilege 2356 New Client.exe Token: SeRestorePrivilege 2356 New Client.exe Token: SeIncreaseQuotaPrivilege 2356 New Client.exe Token: SeAssignPrimaryTokenPrivilege 2356 New Client.exe Token: SeDebugPrivilege 4260 Client.exe Token: SeImpersonatePrivilege 2356 New Client.exe Token: SeTcbPrivilege 2356 New Client.exe Token: SeChangeNotifyPrivilege 2356 New Client.exe Token: SeCreateTokenPrivilege 2356 New Client.exe Token: SeBackupPrivilege 2356 New Client.exe Token: SeRestorePrivilege 2356 New Client.exe Token: SeIncreaseQuotaPrivilege 2356 New Client.exe Token: SeAssignPrimaryTokenPrivilege 2356 New Client.exe Token: SeImpersonatePrivilege 2356 New Client.exe Token: SeTcbPrivilege 2356 New Client.exe Token: SeChangeNotifyPrivilege 2356 New Client.exe Token: SeCreateTokenPrivilege 2356 New Client.exe Token: SeBackupPrivilege 2356 New Client.exe Token: SeRestorePrivilege 2356 New Client.exe Token: SeIncreaseQuotaPrivilege 2356 New Client.exe Token: SeAssignPrimaryTokenPrivilege 2356 New Client.exe Token: SeImpersonatePrivilege 2356 New Client.exe Token: SeTcbPrivilege 2356 New Client.exe Token: SeChangeNotifyPrivilege 2356 New Client.exe Token: SeCreateTokenPrivilege 2356 New Client.exe Token: SeBackupPrivilege 2356 New Client.exe Token: SeRestorePrivilege 2356 New Client.exe Token: SeIncreaseQuotaPrivilege 2356 New Client.exe Token: SeAssignPrimaryTokenPrivilege 2356 New Client.exe Token: SeDebugPrivilege 2116 windows.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exewin.exepid process 3124 3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe 4884 win.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exeClient.exeNew Client.exewindows.exewin.exedescription pid process target process PID 3124 wrote to memory of 2356 3124 3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe New Client.exe PID 3124 wrote to memory of 2356 3124 3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe New Client.exe PID 3124 wrote to memory of 2356 3124 3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe New Client.exe PID 3124 wrote to memory of 4260 3124 3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe Client.exe PID 3124 wrote to memory of 4260 3124 3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe Client.exe PID 3124 wrote to memory of 4260 3124 3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe Client.exe PID 3124 wrote to memory of 4536 3124 3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe WScript.exe PID 3124 wrote to memory of 4536 3124 3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe WScript.exe PID 3124 wrote to memory of 4536 3124 3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe WScript.exe PID 3124 wrote to memory of 4884 3124 3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe win.exe PID 3124 wrote to memory of 4884 3124 3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe win.exe PID 3124 wrote to memory of 4884 3124 3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe win.exe PID 4260 wrote to memory of 2660 4260 Client.exe schtasks.exe PID 4260 wrote to memory of 2660 4260 Client.exe schtasks.exe PID 4260 wrote to memory of 2660 4260 Client.exe schtasks.exe PID 4260 wrote to memory of 4416 4260 Client.exe schtasks.exe PID 4260 wrote to memory of 4416 4260 Client.exe schtasks.exe PID 4260 wrote to memory of 4416 4260 Client.exe schtasks.exe PID 2356 wrote to memory of 4992 2356 New Client.exe cmd.exe PID 2356 wrote to memory of 4992 2356 New Client.exe cmd.exe PID 2356 wrote to memory of 4992 2356 New Client.exe cmd.exe PID 4260 wrote to memory of 2116 4260 Client.exe windows.exe PID 4260 wrote to memory of 2116 4260 Client.exe windows.exe PID 4260 wrote to memory of 2116 4260 Client.exe windows.exe PID 2116 wrote to memory of 3700 2116 windows.exe schtasks.exe PID 2116 wrote to memory of 3700 2116 windows.exe schtasks.exe PID 2116 wrote to memory of 3700 2116 windows.exe schtasks.exe PID 2116 wrote to memory of 4548 2116 windows.exe schtasks.exe PID 2116 wrote to memory of 4548 2116 windows.exe schtasks.exe PID 2116 wrote to memory of 4548 2116 windows.exe schtasks.exe PID 4884 wrote to memory of 1344 4884 win.exe win.exe PID 4884 wrote to memory of 1344 4884 win.exe win.exe PID 4884 wrote to memory of 1344 4884 win.exe win.exe -
outlook_win_path 1 IoCs
Processes:
New Client.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook New Client.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe"C:\Users\Admin\AppData\Local\Temp\3c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\New Client.exe"C:\Users\Admin\AppData\Local\Temp\New Client.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_win_path
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240585984.bat" "C:\Users\Admin\AppData\Local\Temp\New Client.exe" "3⤵
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\Client.exe" /sc minute /mo 13⤵
- Creates scheduled task(s)
-
C:\Users\Admin\windows.exe"C:\Users\Admin\windows.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F4⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\windows.exe" /sc minute /mo 14⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Windows\win.vbs"2⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\Windows\win.exe"C:\Users\Admin\AppData\Local\Temp\Windows\win.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Windows\win.exeC:\Users\Admin\AppData\Local\Temp\Windows\win.exe"3⤵
- Executes dropped EXE
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\240585984.batFilesize
94B
MD53880eeb1c736d853eb13b44898b718ab
SHA14eec9d50360cd815211e3c4e6bdd08271b6ec8e6
SHA256936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7
SHA5123eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b
-
C:\Users\Admin\AppData\Local\Temp\Client.exeFilesize
78KB
MD52c3dfd707a71a723aada2ab5cb4485d6
SHA141357a94ad63b2f6bbe4f4f0a069d6f22a125369
SHA2561ba26b7fefc227463accb9d479889d17439b7de392d09722d271641acf24b23f
SHA512fe6e219e3efb0c8e0ee3a77d5dc198a43df605e9859bf5a1b41dbd8cfae929d9c684025676b80c8f5438e3e4de1d1b9a0a78bf5c5fd2005763e8d254425dcb19
-
C:\Users\Admin\AppData\Local\Temp\Client.exeFilesize
78KB
MD52c3dfd707a71a723aada2ab5cb4485d6
SHA141357a94ad63b2f6bbe4f4f0a069d6f22a125369
SHA2561ba26b7fefc227463accb9d479889d17439b7de392d09722d271641acf24b23f
SHA512fe6e219e3efb0c8e0ee3a77d5dc198a43df605e9859bf5a1b41dbd8cfae929d9c684025676b80c8f5438e3e4de1d1b9a0a78bf5c5fd2005763e8d254425dcb19
-
C:\Users\Admin\AppData\Local\Temp\New Client.exeFilesize
90KB
MD5d076584bcfa0eb1f4fdeea8e37b6691d
SHA13abbecac5296f063ee4dfb7c1726a4521d4ac7c2
SHA256dc2f431a1b1f587a7eacb58d1d86c7ec8183f38c5c86a8b2465dd3dcf4eab995
SHA5121141b4d97a7dc461b5b44a9478eb2c503c35a49d124127848c901cf1e9e1fd65dcdd6f8f10bccf465bdbc708945707acdb6915631d518afee29d10c696419709
-
C:\Users\Admin\AppData\Local\Temp\New Client.exeFilesize
90KB
MD5d076584bcfa0eb1f4fdeea8e37b6691d
SHA13abbecac5296f063ee4dfb7c1726a4521d4ac7c2
SHA256dc2f431a1b1f587a7eacb58d1d86c7ec8183f38c5c86a8b2465dd3dcf4eab995
SHA5121141b4d97a7dc461b5b44a9478eb2c503c35a49d124127848c901cf1e9e1fd65dcdd6f8f10bccf465bdbc708945707acdb6915631d518afee29d10c696419709
-
C:\Users\Admin\AppData\Local\Temp\Windows\win.exeFilesize
613KB
MD53d354d274bea923b12e3950de7f51eea
SHA13ca4aec7982bfbf10804685172974148dbca9d8b
SHA2563c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2
SHA512083826b7348648de76f9112f347057ab2b99a466eb3b444d8a23074dc54882f9ef279513d33443afad51e9ccd51bc6d7cdcba2e9ec9ddb8beb68c6b5310e2cb9
-
C:\Users\Admin\AppData\Local\Temp\Windows\win.exeFilesize
613KB
MD53d354d274bea923b12e3950de7f51eea
SHA13ca4aec7982bfbf10804685172974148dbca9d8b
SHA2563c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2
SHA512083826b7348648de76f9112f347057ab2b99a466eb3b444d8a23074dc54882f9ef279513d33443afad51e9ccd51bc6d7cdcba2e9ec9ddb8beb68c6b5310e2cb9
-
C:\Users\Admin\AppData\Local\Temp\Windows\win.exeFilesize
613KB
MD53d354d274bea923b12e3950de7f51eea
SHA13ca4aec7982bfbf10804685172974148dbca9d8b
SHA2563c333cca8a3575459888665c629c5af42fc1849e8011306441a0ae773d996fb2
SHA512083826b7348648de76f9112f347057ab2b99a466eb3b444d8a23074dc54882f9ef279513d33443afad51e9ccd51bc6d7cdcba2e9ec9ddb8beb68c6b5310e2cb9
-
C:\Users\Admin\AppData\Local\Temp\Windows\win.vbsFilesize
1024B
MD5eb097395c2d5c72a860d6b532f2b7a8b
SHA1c8cb654b617a6bda92c83954b5398eb15f2a4bc3
SHA25672e3fa13c50dea06cf0fcb050b6f3de9d82822d12894aa73365290fa6215894a
SHA5127670c37180c532342ef5ec0f1697e2d2a5002e515b60fabb395eaf960b168c4be6652b771641f6457bd826e807d1c39302948233a51ebc0414ea806548f3fd5b
-
C:\Users\Admin\windows.exeFilesize
78KB
MD52c3dfd707a71a723aada2ab5cb4485d6
SHA141357a94ad63b2f6bbe4f4f0a069d6f22a125369
SHA2561ba26b7fefc227463accb9d479889d17439b7de392d09722d271641acf24b23f
SHA512fe6e219e3efb0c8e0ee3a77d5dc198a43df605e9859bf5a1b41dbd8cfae929d9c684025676b80c8f5438e3e4de1d1b9a0a78bf5c5fd2005763e8d254425dcb19
-
C:\Users\Admin\windows.exeFilesize
78KB
MD52c3dfd707a71a723aada2ab5cb4485d6
SHA141357a94ad63b2f6bbe4f4f0a069d6f22a125369
SHA2561ba26b7fefc227463accb9d479889d17439b7de392d09722d271641acf24b23f
SHA512fe6e219e3efb0c8e0ee3a77d5dc198a43df605e9859bf5a1b41dbd8cfae929d9c684025676b80c8f5438e3e4de1d1b9a0a78bf5c5fd2005763e8d254425dcb19
-
memory/1344-186-0x0000000000000000-mapping.dmp
-
memory/2116-179-0x0000000006DD7000-0x0000000006DDC000-memory.dmpFilesize
20KB
-
memory/2116-180-0x0000000006DD1000-0x0000000006DD6000-memory.dmpFilesize
20KB
-
memory/2116-195-0x0000000006DD4000-0x0000000006DD7000-memory.dmpFilesize
12KB
-
memory/2116-176-0x0000000001689000-0x000000000168F000-memory.dmpFilesize
24KB
-
memory/2116-194-0x0000000006DD0000-0x0000000006DD4000-memory.dmpFilesize
16KB
-
memory/2116-193-0x0000000001689000-0x000000000168F000-memory.dmpFilesize
24KB
-
memory/2116-192-0x0000000006DDC000-0x0000000006DE1000-memory.dmpFilesize
20KB
-
memory/2116-191-0x00000000735D0000-0x0000000073B81000-memory.dmpFilesize
5.7MB
-
memory/2116-189-0x0000000006DD1000-0x0000000006DD6000-memory.dmpFilesize
20KB
-
memory/2116-190-0x0000000001685000-0x000000000168E000-memory.dmpFilesize
36KB
-
memory/2116-178-0x0000000006DD4000-0x0000000006DD7000-memory.dmpFilesize
12KB
-
memory/2116-177-0x0000000006DD0000-0x0000000006DD4000-memory.dmpFilesize
16KB
-
memory/2116-184-0x0000000006DD1000-0x0000000006DD6000-memory.dmpFilesize
20KB
-
memory/2116-175-0x00000000735D0000-0x0000000073B81000-memory.dmpFilesize
5.7MB
-
memory/2116-185-0x0000000001686000-0x000000000168E000-memory.dmpFilesize
32KB
-
memory/2116-182-0x0000000001685000-0x0000000001688000-memory.dmpFilesize
12KB
-
memory/2116-183-0x0000000001688000-0x000000000168E000-memory.dmpFilesize
24KB
-
memory/2116-163-0x0000000000000000-mapping.dmp
-
memory/2116-181-0x0000000001687000-0x000000000168E000-memory.dmpFilesize
28KB
-
memory/2356-134-0x0000000000000000-mapping.dmp
-
memory/2660-149-0x0000000000000000-mapping.dmp
-
memory/3124-146-0x0000000077B80000-0x0000000077D23000-memory.dmpFilesize
1.6MB
-
memory/3124-132-0x0000000002250000-0x0000000002258000-memory.dmpFilesize
32KB
-
memory/3124-133-0x0000000077B80000-0x0000000077D23000-memory.dmpFilesize
1.6MB
-
memory/3700-167-0x0000000000000000-mapping.dmp
-
memory/4260-159-0x0000000006EA1000-0x0000000006EA6000-memory.dmpFilesize
20KB
-
memory/4260-160-0x0000000001AB6000-0x0000000001ABE000-memory.dmpFilesize
32KB
-
memory/4260-173-0x0000000001AB9000-0x0000000001ABF000-memory.dmpFilesize
24KB
-
memory/4260-174-0x0000000001AB5000-0x0000000001AB9000-memory.dmpFilesize
16KB
-
memory/4260-148-0x00000000735D0000-0x0000000073B81000-memory.dmpFilesize
5.7MB
-
memory/4260-170-0x0000000006EA4000-0x0000000006EA7000-memory.dmpFilesize
12KB
-
memory/4260-169-0x0000000006EA0000-0x0000000006EA4000-memory.dmpFilesize
16KB
-
memory/4260-168-0x0000000001AB6000-0x0000000001ABE000-memory.dmpFilesize
32KB
-
memory/4260-166-0x00000000735D0000-0x0000000073B81000-memory.dmpFilesize
5.7MB
-
memory/4260-137-0x0000000000000000-mapping.dmp
-
memory/4260-153-0x0000000001AB9000-0x0000000001ABF000-memory.dmpFilesize
24KB
-
memory/4260-162-0x0000000006EA1000-0x0000000006EA6000-memory.dmpFilesize
20KB
-
memory/4260-161-0x0000000001AB5000-0x0000000001AB9000-memory.dmpFilesize
16KB
-
memory/4260-172-0x0000000006EA7000-0x0000000006EAC000-memory.dmpFilesize
20KB
-
memory/4260-158-0x0000000001AB6000-0x0000000001ABE000-memory.dmpFilesize
32KB
-
memory/4260-156-0x0000000006EA7000-0x0000000006EAC000-memory.dmpFilesize
20KB
-
memory/4260-157-0x0000000006EA1000-0x0000000006EA6000-memory.dmpFilesize
20KB
-
memory/4260-154-0x0000000006EA0000-0x0000000006EA4000-memory.dmpFilesize
16KB
-
memory/4260-155-0x0000000006EA4000-0x0000000006EA7000-memory.dmpFilesize
12KB
-
memory/4416-150-0x0000000000000000-mapping.dmp
-
memory/4536-140-0x0000000000000000-mapping.dmp
-
memory/4548-171-0x0000000000000000-mapping.dmp
-
memory/4884-188-0x0000000077B80000-0x0000000077D23000-memory.dmpFilesize
1.6MB
-
memory/4884-142-0x0000000000000000-mapping.dmp
-
memory/4992-151-0x0000000000000000-mapping.dmp