Analysis
-
max time kernel
153s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 10:51
Static task
static1
Behavioral task
behavioral1
Sample
45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe
Resource
win10v2004-20220414-en
General
-
Target
45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe
-
Size
396KB
-
MD5
369c33b9e8e9839f9f6299d969d6017f
-
SHA1
dfe0698639787b5554bc8fe6e3851e1800b1f15a
-
SHA256
45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5
-
SHA512
cc4b33a6aa8c83d9b3d696eedd386b39941ed3ccbd5cd73b011d2f21ff6f9f59e586a5956ba60eb728c3a0e4f7e3509d9822b09e01d360f1447c1071764cce25
Malware Config
Extracted
C:\$Recycle.Bin\S-1-5-21-2632097139-1792035885-811742494-1000\RECOVERwfpto.txt
http://h5nuwefkuh134ljngkasdbasfg.corolbugan.com/3B6B8DAC725D355
http://p54dhkus4tlkfashdb6vjetgsdfg.greetingshere.at/3B6B8DAC725D355
http://f4dsbjhb45wfiuqeib4fkqeg.meccaledgy.at/3B6B8DAC725D355
http://k7tlx3ghr3m4n2tu.onion/3B6B8DAC725D355
Signatures
-
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
suricata: ET MALWARE Alphacrypt/TeslaCrypt Ransomware CnC Beacon
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 2 IoCs
Processes:
tqsbvq.exetqsbvq.exepid process 4076 tqsbvq.exe 3504 tqsbvq.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exetqsbvq.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe Key value queried \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International\Geo\Nation tqsbvq.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
tqsbvq.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Microsoft\Windows\CurrentVersion\Run tqsbvq.exe Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\_vbsk = "C:\\Windows\\SYSTEM32\\CMD.EXE /C START C:\\Users\\Admin\\Documents\\tqsbvq.exe" tqsbvq.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exetqsbvq.exedescription pid process target process PID 3804 set thread context of 2136 3804 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe PID 4076 set thread context of 3504 4076 tqsbvq.exe tqsbvq.exe -
Drops file in Program Files directory 64 IoCs
Processes:
tqsbvq.exedescription ioc process File opened for modification C:\Program Files\Google\Chrome\Application\RECOVERwfpto.html tqsbvq.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ThirdPartyNotices.MSHWLatin.txt tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\RECOVERwfpto.txt tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\RECOVERwfpto.html tqsbvq.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\RECOVERwfpto.txt tqsbvq.exe File opened for modification C:\Program Files\Common Files\System\msadc\fr-FR\RECOVERwfpto.html tqsbvq.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\RECOVERwfpto.png tqsbvq.exe File opened for modification C:\Program Files\Internet Explorer\SIGNUP\RECOVERwfpto.png tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\RECOVERwfpto.txt tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\lv-LV\RECOVERwfpto.txt tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pl-PL\RECOVERwfpto.png tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\tr-TR\RECOVERwfpto.png tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\en-US\RECOVERwfpto.txt tqsbvq.exe File opened for modification C:\Program Files\Common Files\System\en-US\RECOVERwfpto.png tqsbvq.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_100_percent.pak tqsbvq.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\bg.pak tqsbvq.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\deploy\RECOVERwfpto.txt tqsbvq.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt tqsbvq.exe File opened for modification C:\Program Files\7-Zip\Lang\nn.txt tqsbvq.exe File opened for modification C:\Program Files\7-Zip\Lang\RECOVERwfpto.txt tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\RECOVERwfpto.txt tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\RECOVERwfpto.png tqsbvq.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\include\RECOVERwfpto.txt tqsbvq.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\images\cursors\RECOVERwfpto.html tqsbvq.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt tqsbvq.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ko-KR\RECOVERwfpto.txt tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sl-SI\RECOVERwfpto.png tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\zh-CN\RECOVERwfpto.txt tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Triedit\en-US\RECOVERwfpto.html tqsbvq.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\win_x64\RECOVERwfpto.html tqsbvq.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt tqsbvq.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt tqsbvq.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spl.txt tqsbvq.exe File opened for modification C:\Program Files\7-Zip\Lang\RECOVERwfpto.png tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-MX\RECOVERwfpto.txt tqsbvq.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\RECOVERwfpto.txt tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\el-GR\RECOVERwfpto.png tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\RECOVERwfpto.txt tqsbvq.exe File opened for modification C:\Program Files\Common Files\System\ado\fr-FR\RECOVERwfpto.txt tqsbvq.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\da.pak tqsbvq.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\pt-BR.pak tqsbvq.exe File opened for modification C:\Program Files\Google\Chrome\RECOVERwfpto.png tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\RECOVERwfpto.html tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\RECOVERwfpto.png tqsbvq.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\RECOVERwfpto.html tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\RECOVERwfpto.png tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\RECOVERwfpto.html tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\RECOVERwfpto.html tqsbvq.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\RECOVERwfpto.txt tqsbvq.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\SmallLogoBeta.png tqsbvq.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\applet\RECOVERwfpto.html tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sv-SE\RECOVERwfpto.html tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\zh-TW\RECOVERwfpto.html tqsbvq.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\RECOVERwfpto.html tqsbvq.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\ko.pak tqsbvq.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Locales\sw.pak tqsbvq.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\db\RECOVERwfpto.png tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui\RECOVERwfpto.txt tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\RECOVERwfpto.txt tqsbvq.exe File opened for modification C:\Program Files\Common Files\System\msadc\de-DE\RECOVERwfpto.txt tqsbvq.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\WidevineCdm\_platform_specific\RECOVERwfpto.html tqsbvq.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\RECOVERwfpto.html tqsbvq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 2332 vssadmin.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
tqsbvq.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\trueimg tqsbvq.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
tqsbvq.exepid process 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe 3504 tqsbvq.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
tqsbvq.exevssvc.exedescription pid process Token: SeDebugPrivilege 3504 tqsbvq.exe Token: SeBackupPrivilege 2832 vssvc.exe Token: SeRestorePrivilege 2832 vssvc.exe Token: SeAuditPrivilege 2832 vssvc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exetqsbvq.exetqsbvq.exedescription pid process target process PID 3804 wrote to memory of 2136 3804 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe PID 3804 wrote to memory of 2136 3804 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe PID 3804 wrote to memory of 2136 3804 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe PID 3804 wrote to memory of 2136 3804 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe PID 3804 wrote to memory of 2136 3804 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe PID 3804 wrote to memory of 2136 3804 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe PID 3804 wrote to memory of 2136 3804 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe PID 3804 wrote to memory of 2136 3804 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe PID 3804 wrote to memory of 2136 3804 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe PID 3804 wrote to memory of 2136 3804 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe PID 2136 wrote to memory of 4076 2136 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe tqsbvq.exe PID 2136 wrote to memory of 4076 2136 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe tqsbvq.exe PID 2136 wrote to memory of 4076 2136 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe tqsbvq.exe PID 2136 wrote to memory of 2176 2136 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe cmd.exe PID 2136 wrote to memory of 2176 2136 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe cmd.exe PID 2136 wrote to memory of 2176 2136 45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe cmd.exe PID 4076 wrote to memory of 3504 4076 tqsbvq.exe tqsbvq.exe PID 4076 wrote to memory of 3504 4076 tqsbvq.exe tqsbvq.exe PID 4076 wrote to memory of 3504 4076 tqsbvq.exe tqsbvq.exe PID 4076 wrote to memory of 3504 4076 tqsbvq.exe tqsbvq.exe PID 4076 wrote to memory of 3504 4076 tqsbvq.exe tqsbvq.exe PID 4076 wrote to memory of 3504 4076 tqsbvq.exe tqsbvq.exe PID 4076 wrote to memory of 3504 4076 tqsbvq.exe tqsbvq.exe PID 4076 wrote to memory of 3504 4076 tqsbvq.exe tqsbvq.exe PID 4076 wrote to memory of 3504 4076 tqsbvq.exe tqsbvq.exe PID 4076 wrote to memory of 3504 4076 tqsbvq.exe tqsbvq.exe PID 3504 wrote to memory of 2332 3504 tqsbvq.exe vssadmin.exe PID 3504 wrote to memory of 2332 3504 tqsbvq.exe vssadmin.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
tqsbvq.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" tqsbvq.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System tqsbvq.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe"C:\Users\Admin\AppData\Local\Temp\45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe"C:\Users\Admin\AppData\Local\Temp\45c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\tqsbvq.exeC:\Users\Admin\Documents\tqsbvq.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\tqsbvq.exeC:\Users\Admin\Documents\tqsbvq.exe4⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" Delete Shadows /All /Quiet5⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c DEL C:\Users\Admin\AppData\Local\Temp\45C912~1.EXE >> NUL3⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Documents\tqsbvq.exeFilesize
396KB
MD5369c33b9e8e9839f9f6299d969d6017f
SHA1dfe0698639787b5554bc8fe6e3851e1800b1f15a
SHA25645c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5
SHA512cc4b33a6aa8c83d9b3d696eedd386b39941ed3ccbd5cd73b011d2f21ff6f9f59e586a5956ba60eb728c3a0e4f7e3509d9822b09e01d360f1447c1071764cce25
-
C:\Users\Admin\Documents\tqsbvq.exeFilesize
396KB
MD5369c33b9e8e9839f9f6299d969d6017f
SHA1dfe0698639787b5554bc8fe6e3851e1800b1f15a
SHA25645c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5
SHA512cc4b33a6aa8c83d9b3d696eedd386b39941ed3ccbd5cd73b011d2f21ff6f9f59e586a5956ba60eb728c3a0e4f7e3509d9822b09e01d360f1447c1071764cce25
-
C:\Users\Admin\Documents\tqsbvq.exeFilesize
396KB
MD5369c33b9e8e9839f9f6299d969d6017f
SHA1dfe0698639787b5554bc8fe6e3851e1800b1f15a
SHA25645c91234b6ad5955140973834c39a8cf2e4e6b7f1b3900a85a4903ba40f82cc5
SHA512cc4b33a6aa8c83d9b3d696eedd386b39941ed3ccbd5cd73b011d2f21ff6f9f59e586a5956ba60eb728c3a0e4f7e3509d9822b09e01d360f1447c1071764cce25
-
memory/2136-135-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/2136-142-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/2136-143-0x0000000074BD0000-0x0000000074C09000-memory.dmpFilesize
228KB
-
memory/2136-136-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/2136-137-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/2136-133-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/2136-132-0x0000000000000000-mapping.dmp
-
memory/2176-141-0x0000000000000000-mapping.dmp
-
memory/2332-152-0x0000000000000000-mapping.dmp
-
memory/3504-150-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/3504-145-0x0000000000000000-mapping.dmp
-
memory/3504-148-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/3504-149-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/3504-151-0x0000000074BD0000-0x0000000074C09000-memory.dmpFilesize
228KB
-
memory/3504-153-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/3804-130-0x00000000020B0000-0x00000000020B6000-memory.dmpFilesize
24KB
-
memory/3804-131-0x00000000020B0000-0x00000000020B6000-memory.dmpFilesize
24KB
-
memory/3804-134-0x00000000020B0000-0x00000000020B6000-memory.dmpFilesize
24KB
-
memory/4076-144-0x0000000000600000-0x0000000000606000-memory.dmpFilesize
24KB
-
memory/4076-138-0x0000000000000000-mapping.dmp