Analysis
-
max time kernel
153s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
12-08-2022 17:05
Static task
static1
Behavioral task
behavioral1
Sample
d30fc78dbb74a199088c33cc696c2ba3ab37e7443bd97d29e390bfeb5b6f6ab6.exe
Resource
win10-20220812-en
General
-
Target
d30fc78dbb74a199088c33cc696c2ba3ab37e7443bd97d29e390bfeb5b6f6ab6.exe
-
Size
692KB
-
MD5
4698e3da4899e50dbb70a6dfdb71e506
-
SHA1
1ed6db89615f4bc647386488482f57a85fb73073
-
SHA256
d30fc78dbb74a199088c33cc696c2ba3ab37e7443bd97d29e390bfeb5b6f6ab6
-
SHA512
fc21eb8c9abf9bb1fb5069dc816c7e1a2681bec7a40c4ee0a0d2d254b32125d5c785d4eb594e4a0127b38041d40ec6acd9448187ecd8cbb7a542f5df0e60ec1c
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
dllhost.exepid process 1240 dllhost.exe -
Adds Run key to start application 2 TTPs 9 IoCs
Processes:
dllhost.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Windows\\System32\\SecurityHealthSystray.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "C:\\Windows\\System32\\wbem\\WmiPrvSE.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\AntiMalwareServiceExecutable = "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.2111.5-0\\MsMpEng.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvStray = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\dllhost = "C:\\ProgramData\\Dllhost\\dllhost.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDefender = "C:\\Program Files\\Windows Defender\\MpCmdRun.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cortana = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe\\Cortana.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftEdgeUpd = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\OneDriveService = "C:\\Program Files\\WindowsApps\\Microsoft.x64__8wekyb3gfdfdgd8bbwe/file.exe" dllhost.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Creates scheduled task(s) 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2800 schtasks.exe 4524 schtasks.exe 4408 schtasks.exe 5080 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exedllhost.exepowershell.exepid process 5104 powershell.exe 5104 powershell.exe 5104 powershell.exe 1388 powershell.exe 1388 powershell.exe 1388 powershell.exe 1240 dllhost.exe 96 powershell.exe 1240 dllhost.exe 96 powershell.exe 96 powershell.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe 1240 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
powershell.exed30fc78dbb74a199088c33cc696c2ba3ab37e7443bd97d29e390bfeb5b6f6ab6.exepowershell.exedllhost.exepowershell.exedescription pid process Token: SeDebugPrivilege 5104 powershell.exe Token: SeDebugPrivilege 3676 d30fc78dbb74a199088c33cc696c2ba3ab37e7443bd97d29e390bfeb5b6f6ab6.exe Token: SeDebugPrivilege 1388 powershell.exe Token: SeDebugPrivilege 1240 dllhost.exe Token: SeDebugPrivilege 96 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d30fc78dbb74a199088c33cc696c2ba3ab37e7443bd97d29e390bfeb5b6f6ab6.execmd.exedllhost.execmd.execmd.execmd.execmd.exedescription pid process target process PID 3676 wrote to memory of 1956 3676 d30fc78dbb74a199088c33cc696c2ba3ab37e7443bd97d29e390bfeb5b6f6ab6.exe cmd.exe PID 3676 wrote to memory of 1956 3676 d30fc78dbb74a199088c33cc696c2ba3ab37e7443bd97d29e390bfeb5b6f6ab6.exe cmd.exe PID 3676 wrote to memory of 1956 3676 d30fc78dbb74a199088c33cc696c2ba3ab37e7443bd97d29e390bfeb5b6f6ab6.exe cmd.exe PID 1956 wrote to memory of 5100 1956 cmd.exe chcp.com PID 1956 wrote to memory of 5100 1956 cmd.exe chcp.com PID 1956 wrote to memory of 5100 1956 cmd.exe chcp.com PID 1956 wrote to memory of 5104 1956 cmd.exe powershell.exe PID 1956 wrote to memory of 5104 1956 cmd.exe powershell.exe PID 1956 wrote to memory of 5104 1956 cmd.exe powershell.exe PID 1956 wrote to memory of 1388 1956 cmd.exe powershell.exe PID 1956 wrote to memory of 1388 1956 cmd.exe powershell.exe PID 1956 wrote to memory of 1388 1956 cmd.exe powershell.exe PID 3676 wrote to memory of 1240 3676 d30fc78dbb74a199088c33cc696c2ba3ab37e7443bd97d29e390bfeb5b6f6ab6.exe dllhost.exe PID 3676 wrote to memory of 1240 3676 d30fc78dbb74a199088c33cc696c2ba3ab37e7443bd97d29e390bfeb5b6f6ab6.exe dllhost.exe PID 3676 wrote to memory of 1240 3676 d30fc78dbb74a199088c33cc696c2ba3ab37e7443bd97d29e390bfeb5b6f6ab6.exe dllhost.exe PID 1956 wrote to memory of 96 1956 cmd.exe powershell.exe PID 1956 wrote to memory of 96 1956 cmd.exe powershell.exe PID 1956 wrote to memory of 96 1956 cmd.exe powershell.exe PID 1240 wrote to memory of 1004 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 1004 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 1004 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 2712 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 2712 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 2712 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 4928 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 4928 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 4928 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 3552 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 3552 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 3552 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 2520 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 2520 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 2520 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 3848 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 3848 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 3848 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 3832 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 3832 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 3832 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 4492 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 4492 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 4492 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 388 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 388 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 388 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 3796 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 3796 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 3796 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 3432 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 3432 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 3432 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 2404 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 2404 1240 dllhost.exe cmd.exe PID 1240 wrote to memory of 2404 1240 dllhost.exe cmd.exe PID 3552 wrote to memory of 2800 3552 cmd.exe schtasks.exe PID 3552 wrote to memory of 2800 3552 cmd.exe schtasks.exe PID 3552 wrote to memory of 2800 3552 cmd.exe schtasks.exe PID 2520 wrote to memory of 4524 2520 cmd.exe schtasks.exe PID 2520 wrote to memory of 4524 2520 cmd.exe schtasks.exe PID 2520 wrote to memory of 4524 2520 cmd.exe schtasks.exe PID 4928 wrote to memory of 4408 4928 cmd.exe schtasks.exe PID 4928 wrote to memory of 4408 4928 cmd.exe schtasks.exe PID 4928 wrote to memory of 4408 4928 cmd.exe schtasks.exe PID 2404 wrote to memory of 5080 2404 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d30fc78dbb74a199088c33cc696c2ba3ab37e7443bd97d29e390bfeb5b6f6ab6.exe"C:\Users\Admin\AppData\Local\Temp\d30fc78dbb74a199088c33cc696c2ba3ab37e7443bd97d29e390bfeb5b6f6ab6.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C chcp 1251 & powershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost" & powershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp 12513⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "$ENV:USERPROFILE\Desktop"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\Dllhost"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\ProgramData\HostData"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\ProgramData\Dllhost\dllhost.exe"C:\ProgramData\Dllhost\dllhost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk1773" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk8264" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk8264" /TR "C:\ProgramData\Dllhost\dllhost.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk1824" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk4331" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c chcp 1251 & C:\ProgramData\Dllhost\winlogson.exe --config msi.bin --log off3⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12514⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Dllhost\dllhost.exeFilesize
796KB
MD56dd51b7dfbbdd5edf0b8aca5aca0b7d0
SHA1339f70f0a104ea184e971d64606b9a4dd3d16c62
SHA2565a637292050625b4ee5fd45060a159d21c0b3b79e28d077d64b683daf65943d1
SHA51265b2d80e5473101cac7d182db08c4d6c2a11c9e006088b3139d3243776a490a0268ad81acc1a54029f1744f4bb10ec022306d9243769d33a54bac2c7885a00ea
-
C:\ProgramData\Dllhost\dllhost.exeFilesize
796KB
MD56dd51b7dfbbdd5edf0b8aca5aca0b7d0
SHA1339f70f0a104ea184e971d64606b9a4dd3d16c62
SHA2565a637292050625b4ee5fd45060a159d21c0b3b79e28d077d64b683daf65943d1
SHA51265b2d80e5473101cac7d182db08c4d6c2a11c9e006088b3139d3243776a490a0268ad81acc1a54029f1744f4bb10ec022306d9243769d33a54bac2c7885a00ea
-
C:\ProgramData\HostData\logs.uceFilesize
497B
MD513fda2ab01b83a5130842a5bab3892d3
SHA16e18e4b467cde054a63a95d4dfc030f156ecd215
SHA25676973d42c8fceceab7ec85b3d01b218db92564993e93a9bea31c52aa73aeee9e
SHA512c51f9fd6e452fbeeedd4dfaba3c7c887e337f01e68abdd27d4032f8be85def7ef3cf0c77bf60e425b085b76c0539464c6b6e5e805a69397c5519e8ccf9fffccc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD55bc017cbb2c47e2d884daf85e77118ef
SHA16208db31cb6bf4d44c3ef74cfae7238c3956fe4a
SHA256db24b7562f096e19454e743129d3b01e0da33a708d428619bf586e1ac6f71a51
SHA5123efcfb3d634bbebc379fd5c7ad03d24d1815b9f4b1a6dcf83699c2876625b3ef046efaa969f989cf551ee74d4c59403c92e9b785dcbc00188245fb53b5668553
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD5773bbfb21152ed7ad46109993e537487
SHA1af9e82ec1ea440d63d47cd892a248e2e81a03cd9
SHA25642ca7998887beafbac967d64d5b457268cf966d0252af19f16a9ee984b959fe4
SHA5126d2c76677c3f979213bb3aeda31db8dd3dabbba986274f817cf3610a619fee2e05d648f5d30552d2cf10c371d10e8068cda6231949353ebf288fff0ba6dcbb99
-
memory/96-1117-0x0000000009630000-0x00000000096D5000-memory.dmpFilesize
660KB
-
memory/96-862-0x0000000000000000-mapping.dmp
-
memory/388-961-0x0000000000000000-mapping.dmp
-
memory/1004-924-0x0000000000000000-mapping.dmp
-
memory/1240-885-0x0000000000FB0000-0x0000000001060000-memory.dmpFilesize
704KB
-
memory/1240-828-0x0000000000000000-mapping.dmp
-
memory/1388-526-0x0000000000000000-mapping.dmp
-
memory/1956-176-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/1956-179-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/1956-174-0x0000000000000000-mapping.dmp
-
memory/1956-178-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/1956-175-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/1956-177-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/2404-979-0x0000000000000000-mapping.dmp
-
memory/2520-938-0x0000000000000000-mapping.dmp
-
memory/2712-926-0x0000000000000000-mapping.dmp
-
memory/2800-1018-0x0000000000000000-mapping.dmp
-
memory/3412-1389-0x0000000000000000-mapping.dmp
-
memory/3432-972-0x0000000000000000-mapping.dmp
-
memory/3432-1395-0x0000000000000000-mapping.dmp
-
memory/3552-933-0x0000000000000000-mapping.dmp
-
memory/3676-146-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-138-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-132-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-147-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-148-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-149-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-150-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-151-0x00000000000D0000-0x0000000000178000-memory.dmpFilesize
672KB
-
memory/3676-152-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-153-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-154-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-155-0x0000000005030000-0x000000000552E000-memory.dmpFilesize
5.0MB
-
memory/3676-119-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-157-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-158-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-159-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-160-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-161-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-162-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-163-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-164-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-165-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-166-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-167-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-168-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-169-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-170-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-171-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-172-0x00000000049A0000-0x00000000049AA000-memory.dmpFilesize
40KB
-
memory/3676-173-0x0000000004B30000-0x0000000004B96000-memory.dmpFilesize
408KB
-
memory/3676-144-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-143-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-118-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-142-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-141-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-120-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-140-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-121-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-131-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-139-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-156-0x00000000049E0000-0x0000000004A72000-memory.dmpFilesize
584KB
-
memory/3676-133-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-134-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-122-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-135-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-136-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-123-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-137-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-145-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-124-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-125-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-126-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-127-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-128-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-129-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3676-130-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/3796-966-0x0000000000000000-mapping.dmp
-
memory/3832-949-0x0000000000000000-mapping.dmp
-
memory/3848-943-0x0000000000000000-mapping.dmp
-
memory/4264-1424-0x0000000000000000-mapping.dmp
-
memory/4356-1418-0x0000000000000000-mapping.dmp
-
memory/4408-1023-0x0000000000000000-mapping.dmp
-
memory/4492-955-0x0000000000000000-mapping.dmp
-
memory/4524-1020-0x0000000000000000-mapping.dmp
-
memory/4568-1448-0x0000000000000000-mapping.dmp
-
memory/4884-1442-0x0000000000000000-mapping.dmp
-
memory/4928-930-0x0000000000000000-mapping.dmp
-
memory/5080-1051-0x0000000000000000-mapping.dmp
-
memory/5100-181-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/5100-187-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/5100-184-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/5100-183-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/5100-182-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/5100-180-0x0000000000000000-mapping.dmp
-
memory/5100-185-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/5100-186-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/5104-253-0x0000000007A60000-0x0000000007A7C000-memory.dmpFilesize
112KB
-
memory/5104-296-0x00000000095A0000-0x0000000009645000-memory.dmpFilesize
660KB
-
memory/5104-189-0x0000000077A40000-0x0000000077BCE000-memory.dmpFilesize
1.6MB
-
memory/5104-254-0x0000000008460000-0x00000000084AB000-memory.dmpFilesize
300KB
-
memory/5104-258-0x0000000008290000-0x0000000008306000-memory.dmpFilesize
472KB
-
memory/5104-246-0x0000000007850000-0x0000000007872000-memory.dmpFilesize
136KB
-
memory/5104-286-0x00000000091C0000-0x00000000091F3000-memory.dmpFilesize
204KB
-
memory/5104-188-0x0000000000000000-mapping.dmp
-
memory/5104-224-0x0000000004AF0000-0x0000000004B26000-memory.dmpFilesize
216KB
-
memory/5104-229-0x00000000071F0000-0x0000000007818000-memory.dmpFilesize
6.2MB
-
memory/5104-250-0x0000000007BB0000-0x0000000007F00000-memory.dmpFilesize
3.3MB
-
memory/5104-249-0x0000000007AD0000-0x0000000007B36000-memory.dmpFilesize
408KB
-
memory/5104-287-0x0000000009070000-0x000000000908E000-memory.dmpFilesize
120KB
-
memory/5104-508-0x0000000009270000-0x0000000009278000-memory.dmpFilesize
32KB
-
memory/5104-503-0x0000000009280000-0x000000000929A000-memory.dmpFilesize
104KB
-
memory/5104-300-0x00000000096F0000-0x0000000009784000-memory.dmpFilesize
592KB