Analysis
-
max time kernel
153s -
max time network
162s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20-09-2022 17:31
Behavioral task
behavioral1
Sample
AppSetup/Setup.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
AppSetup/Setup.exe
Resource
win10v2004-20220812-en
General
-
Target
AppSetup/Setup.exe
-
Size
700.0MB
-
MD5
b494ad739d58aba5ce48c05a29215496
-
SHA1
4e18330d3779e3c13b043d2090e6a0ce1571668a
-
SHA256
6c7e2a5a6b4fcad8591cf0ba6854333d44d2be2724d0922f374791eb15e94d89
-
SHA512
2747aa2ab4a8ea2ada344d2e4a9bbf4f1d15893b4fbfd4a84dbf08d7a6d90517445bf5dc0569299e4b9a2edd17537382e5a9db6df7bb3c1b39eb1858ef17ec8b
-
SSDEEP
98304:Rv578/6bPZsGjNT46RutNpYdFU8xgFLqmMLfN:Rv578/iaGjNT493WgDo
Malware Config
Extracted
raccoon
53b091e45e3b45faf54ed22a972aa360
http://168.100.9.109/
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
Decoder.exewfyoot.exewfyoot.exesvhost.exepid process 548 Decoder.exe 1920 wfyoot.exe 1208 wfyoot.exe 1000 svhost.exe -
Loads dropped DLL 2 IoCs
Processes:
Decoder.exewfyoot.exepid process 548 Decoder.exe 1920 wfyoot.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1648-54-0x0000000000BB0000-0x0000000000EFE000-memory.dmp agile_net -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
Setup.exeSetup.exewfyoot.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ushoh = "\"C:\\Users\\Admin\\AppData\\Roaming\\Xuavfaxqb\\Ushoh.exe\"" Setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" Setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\1nstall.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000468021\\1nstall.cmd" wfyoot.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\svhost.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000480001\\svhost.exe" wfyoot.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
Decoder.exewfyoot.exewfyoot.exepid process 548 Decoder.exe 1920 wfyoot.exe 1208 wfyoot.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Setup.exesvhost.exedescription pid process target process PID 1648 set thread context of 1976 1648 Setup.exe Setup.exe PID 1000 set thread context of 808 1000 svhost.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 776 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
powershell.exeSetup.exepowershell.exeDecoder.exewfyoot.exewfyoot.exepowershell.exesvhost.exepid process 1484 powershell.exe 1648 Setup.exe 912 powershell.exe 1648 Setup.exe 548 Decoder.exe 1920 wfyoot.exe 1208 wfyoot.exe 684 powershell.exe 1000 svhost.exe 1000 svhost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
powershell.exeSetup.exepowershell.exesvhost.exepowershell.exedescription pid process Token: SeDebugPrivilege 1484 powershell.exe Token: SeDebugPrivilege 1648 Setup.exe Token: SeDebugPrivilege 912 powershell.exe Token: SeDebugPrivilege 1000 svhost.exe Token: SeDebugPrivilege 684 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Setup.exeSetup.exeDecoder.exewfyoot.exetaskeng.execmd.exesvhost.exedescription pid process target process PID 1648 wrote to memory of 1484 1648 Setup.exe powershell.exe PID 1648 wrote to memory of 1484 1648 Setup.exe powershell.exe PID 1648 wrote to memory of 1484 1648 Setup.exe powershell.exe PID 1648 wrote to memory of 912 1648 Setup.exe powershell.exe PID 1648 wrote to memory of 912 1648 Setup.exe powershell.exe PID 1648 wrote to memory of 912 1648 Setup.exe powershell.exe PID 1648 wrote to memory of 1976 1648 Setup.exe Setup.exe PID 1648 wrote to memory of 1976 1648 Setup.exe Setup.exe PID 1648 wrote to memory of 1976 1648 Setup.exe Setup.exe PID 1648 wrote to memory of 1976 1648 Setup.exe Setup.exe PID 1648 wrote to memory of 1976 1648 Setup.exe Setup.exe PID 1648 wrote to memory of 1976 1648 Setup.exe Setup.exe PID 1648 wrote to memory of 1976 1648 Setup.exe Setup.exe PID 1648 wrote to memory of 1976 1648 Setup.exe Setup.exe PID 1648 wrote to memory of 1976 1648 Setup.exe Setup.exe PID 1648 wrote to memory of 1976 1648 Setup.exe Setup.exe PID 1648 wrote to memory of 1976 1648 Setup.exe Setup.exe PID 1976 wrote to memory of 548 1976 Setup.exe Decoder.exe PID 1976 wrote to memory of 548 1976 Setup.exe Decoder.exe PID 1976 wrote to memory of 548 1976 Setup.exe Decoder.exe PID 1976 wrote to memory of 548 1976 Setup.exe Decoder.exe PID 1976 wrote to memory of 548 1976 Setup.exe Decoder.exe PID 1976 wrote to memory of 548 1976 Setup.exe Decoder.exe PID 1976 wrote to memory of 548 1976 Setup.exe Decoder.exe PID 548 wrote to memory of 1920 548 Decoder.exe wfyoot.exe PID 548 wrote to memory of 1920 548 Decoder.exe wfyoot.exe PID 548 wrote to memory of 1920 548 Decoder.exe wfyoot.exe PID 548 wrote to memory of 1920 548 Decoder.exe wfyoot.exe PID 548 wrote to memory of 1920 548 Decoder.exe wfyoot.exe PID 548 wrote to memory of 1920 548 Decoder.exe wfyoot.exe PID 548 wrote to memory of 1920 548 Decoder.exe wfyoot.exe PID 1920 wrote to memory of 1136 1920 wfyoot.exe schtasks.exe PID 1920 wrote to memory of 1136 1920 wfyoot.exe schtasks.exe PID 1920 wrote to memory of 1136 1920 wfyoot.exe schtasks.exe PID 1920 wrote to memory of 1136 1920 wfyoot.exe schtasks.exe PID 1004 wrote to memory of 1208 1004 taskeng.exe wfyoot.exe PID 1004 wrote to memory of 1208 1004 taskeng.exe wfyoot.exe PID 1004 wrote to memory of 1208 1004 taskeng.exe wfyoot.exe PID 1004 wrote to memory of 1208 1004 taskeng.exe wfyoot.exe PID 1004 wrote to memory of 1208 1004 taskeng.exe wfyoot.exe PID 1004 wrote to memory of 1208 1004 taskeng.exe wfyoot.exe PID 1004 wrote to memory of 1208 1004 taskeng.exe wfyoot.exe PID 1920 wrote to memory of 2016 1920 wfyoot.exe cmd.exe PID 1920 wrote to memory of 2016 1920 wfyoot.exe cmd.exe PID 1920 wrote to memory of 2016 1920 wfyoot.exe cmd.exe PID 1920 wrote to memory of 2016 1920 wfyoot.exe cmd.exe PID 2016 wrote to memory of 1824 2016 cmd.exe reg.exe PID 2016 wrote to memory of 1824 2016 cmd.exe reg.exe PID 2016 wrote to memory of 1824 2016 cmd.exe reg.exe PID 2016 wrote to memory of 1824 2016 cmd.exe reg.exe PID 2016 wrote to memory of 776 2016 cmd.exe ipconfig.exe PID 2016 wrote to memory of 776 2016 cmd.exe ipconfig.exe PID 2016 wrote to memory of 776 2016 cmd.exe ipconfig.exe PID 2016 wrote to memory of 776 2016 cmd.exe ipconfig.exe PID 1920 wrote to memory of 1000 1920 wfyoot.exe svhost.exe PID 1920 wrote to memory of 1000 1920 wfyoot.exe svhost.exe PID 1920 wrote to memory of 1000 1920 wfyoot.exe svhost.exe PID 1920 wrote to memory of 1000 1920 wfyoot.exe svhost.exe PID 1920 wrote to memory of 1000 1920 wfyoot.exe svhost.exe PID 1920 wrote to memory of 1000 1920 wfyoot.exe svhost.exe PID 1920 wrote to memory of 1000 1920 wfyoot.exe svhost.exe PID 1000 wrote to memory of 684 1000 svhost.exe powershell.exe PID 1000 wrote to memory of 684 1000 svhost.exe powershell.exe PID 1000 wrote to memory of 684 1000 svhost.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AppSetup\Setup.exe"C:\Users\Admin\AppData\Local\Temp\AppSetup\Setup.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 302⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\AppSetup\Setup.exeC:\Users\Admin\AppData\Local\Temp\AppSetup\Setup.exe2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Decoder.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Decoder.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\314209c118\wfyoot.exe"C:\Users\Admin\AppData\Local\Temp\314209c118\wfyoot.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN wfyoot.exe /TR "C:\Users\Admin\AppData\Local\Temp\314209c118\wfyoot.exe" /F5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1000468021\1nstall.cmd" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg query HKEY_CURRENT_USER\SOFTWARE\miHoYo /s6⤵
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all6⤵
- Gathers network information
-
C:\Users\Admin\AppData\Local\Temp\1000480001\svhost.exe"C:\Users\Admin\AppData\Local\Temp\1000480001\svhost.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAyAA==6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe6⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {67FF9106-FA28-43D2-945A-CD7927724BDF} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\314209c118\wfyoot.exeC:\Users\Admin\AppData\Local\Temp\314209c118\wfyoot.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1000468021\1nstall.cmdFilesize
203B
MD5e539a159ce5a1c597f537a920ae72652
SHA17d808565ebfe7a5f03b84bd40c8dd9477d7390f4
SHA256760a1b9e7652cf8215161083e23f4f89f6c25d25c462b57591b13cc703338e3e
SHA512d75b97ea4bb3dda43f20f7117abaa538d92ebef906605cd6e176592192a2e07dbc33dbfed271dfc6093bf66b03723c92f6b942a718b0ee35188ab9df73e778b1
-
C:\Users\Admin\AppData\Local\Temp\1000480001\svhost.exeFilesize
221KB
MD584cdd038136ea850a8df2f72dceb46f6
SHA1eea33cdc4cbf8f46ef405d69077d6b16763768b4
SHA256c93ae488d039def12b64ad966edf70369ddbcd5ea0d83f98247d15750ad39511
SHA51226b0872625601cb884f81266fbe042beb3c2887df00f0dc468d76719739a823402f52ef6593129ebcff05bb11cee80e89a498730aef9177df199a28a58dc64aa
-
C:\Users\Admin\AppData\Local\Temp\1000480001\svhost.exeFilesize
221KB
MD584cdd038136ea850a8df2f72dceb46f6
SHA1eea33cdc4cbf8f46ef405d69077d6b16763768b4
SHA256c93ae488d039def12b64ad966edf70369ddbcd5ea0d83f98247d15750ad39511
SHA51226b0872625601cb884f81266fbe042beb3c2887df00f0dc468d76719739a823402f52ef6593129ebcff05bb11cee80e89a498730aef9177df199a28a58dc64aa
-
C:\Users\Admin\AppData\Local\Temp\314209c118\wfyoot.exeFilesize
158.4MB
MD56da716ec9557f1dbf40b93385888d42f
SHA1d16c19e0c10e8ead9a37c4ec8083309a5d51f1b7
SHA25639428f0270e68ef5d7d4360814c9cf34ab8e4b572ecf424245531ff63ce01bc6
SHA512ca20936c483e8423ac151b1af18ef9992261e2ec9a3e3cc64b89e33d9e7c0c7bbb1bd68f6d713011553a8470866e8513d27dfbfcec28f8cee0ed5d14858e1b7f
-
C:\Users\Admin\AppData\Local\Temp\314209c118\wfyoot.exeFilesize
161.6MB
MD5522ad0313c7cecf161dd487466911ecb
SHA11b8a3dce2c007e97fd1aed118b5440d4e1ee5784
SHA2563d4102d251f97660ca3c6b787a48182b473ef2c698d7974f28cf465ec711c635
SHA51222e0611357e0c087dcdfd7bbc30b39652cefe325369c17de1605e4e7c3dcbcab65a33d95ca90a87691943634965e43d91ab062b9f756cae7f82e04d985a406cd
-
C:\Users\Admin\AppData\Local\Temp\314209c118\wfyoot.exeFilesize
152.6MB
MD5f3df23ce51a668cc02192273089ec5ba
SHA150f3250537cceb1e88ca39e2fb6dde891559f8ae
SHA2568117791cd406e14e207997c162e5ad1c9a5ed9ec4676fa6e6d3d693b0320c0df
SHA512ffb2af78f519acaddf2e07d18eb11a13e59efcfebc0e3343315cc87783fe06b60f2ec5df754f7328a353a2f97e6ae9bcfacaf11fa80c19448c18524c3f50da3f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Decoder.exeFilesize
244.3MB
MD5dbabe677f52e8e10e28fc1270fecd2e6
SHA18cb2611e0c815890433e36dbf6c5451e8a177eb0
SHA25627b3fc3c63a82685f3108904b8a1d2bf2ec2caa872c5eed10c62683e8ff2aa38
SHA512e51c1d04efcd4bfe8b3d88631ba01fce05c015b34701d4afff72e9649b0645e2cd6bcbae075e3b99d68d33fa4625264ddab7b3ae1420c67952826ed48f804356
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Decoder.exeFilesize
235.2MB
MD5762288445ff7abf7e69a5d16bb0821a7
SHA133863627bf099724133d424954adbd02553bd1c0
SHA25697cb03e3c4f5e90d5a58387e62e8f2af74661acd38fd50750a430d57d9c8c901
SHA512ed4e206b44665cbab7376a69ca36c950408c3f6b0cf75fc035174918c3379f811845f4d065f0fc7ea780de7ae8254ee45f7ab1b6c17369f4db7558cbb7fb2017
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD55b1e9bfcb3311a00792f0984d79bf5d9
SHA1671fa427db0279ca86497a74e1a41d19e02aafed
SHA256f7cbc33effacc2fde6f9ccba4845e45be0f7c02c77e26be3edd1d5ce381e484f
SHA512e28cd8932f98e7ed0b51a463009e4a8c642869853b529f914dde185f0238aa692ecf47f7d4ec45f34c97d21cb0ef8f5e2483363522ee1fcfeb11bce728afca50
-
\Users\Admin\AppData\Local\Temp\1000480001\svhost.exeFilesize
221KB
MD584cdd038136ea850a8df2f72dceb46f6
SHA1eea33cdc4cbf8f46ef405d69077d6b16763768b4
SHA256c93ae488d039def12b64ad966edf70369ddbcd5ea0d83f98247d15750ad39511
SHA51226b0872625601cb884f81266fbe042beb3c2887df00f0dc468d76719739a823402f52ef6593129ebcff05bb11cee80e89a498730aef9177df199a28a58dc64aa
-
\Users\Admin\AppData\Local\Temp\314209c118\wfyoot.exeFilesize
147.1MB
MD5f6639bc060589e333a201b1dee2ca9c8
SHA1a7fb51d0eacddf7a1d3355306a23215a348e5196
SHA256303412298430491ff6f06e7de6c03deb018e64254729f56e48c1765cd8098dc7
SHA5127bcb223bf45fd15d90c441639dcd971916d299f1a16d3f975c0bb147dbcca2f562507ac374e8920b2a534a0fa7fcd76d1d22dcf98a81bc4c681749d098519bd0
-
memory/548-109-0x00000000007E0000-0x0000000000826000-memory.dmpFilesize
280KB
-
memory/548-93-0x0000000000E90000-0x0000000000F66000-memory.dmpFilesize
856KB
-
memory/548-97-0x0000000000E90000-0x0000000000F66000-memory.dmpFilesize
856KB
-
memory/548-95-0x0000000000E90000-0x0000000000F66000-memory.dmpFilesize
856KB
-
memory/548-108-0x0000000000E90000-0x0000000000F66000-memory.dmpFilesize
856KB
-
memory/548-96-0x0000000000E90000-0x0000000000F66000-memory.dmpFilesize
856KB
-
memory/548-103-0x0000000000E90000-0x0000000000F66000-memory.dmpFilesize
856KB
-
memory/548-98-0x0000000075811000-0x0000000075813000-memory.dmpFilesize
8KB
-
memory/548-91-0x0000000000000000-mapping.dmp
-
memory/548-99-0x0000000000E90000-0x0000000000F66000-memory.dmpFilesize
856KB
-
memory/548-100-0x0000000076DE0000-0x0000000076E8C000-memory.dmpFilesize
688KB
-
memory/548-102-0x00000000007E0000-0x0000000000826000-memory.dmpFilesize
280KB
-
memory/684-186-0x0000000000000000-mapping.dmp
-
memory/684-189-0x000000006EE50000-0x000000006F3FB000-memory.dmpFilesize
5.7MB
-
memory/684-188-0x000000006EE50000-0x000000006F3FB000-memory.dmpFilesize
5.7MB
-
memory/776-151-0x0000000000000000-mapping.dmp
-
memory/808-191-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/808-190-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/808-193-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/808-195-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/808-199-0x0000000000408597-mapping.dmp
-
memory/808-203-0x0000000000400000-0x0000000000414000-memory.dmpFilesize
80KB
-
memory/912-68-0x000007FEEB9C0000-0x000007FEEC3E3000-memory.dmpFilesize
10.1MB
-
memory/912-74-0x000000000275B000-0x000000000277A000-memory.dmpFilesize
124KB
-
memory/912-65-0x0000000000000000-mapping.dmp
-
memory/912-70-0x000000001B770000-0x000000001BA6F000-memory.dmpFilesize
3.0MB
-
memory/912-72-0x0000000002754000-0x0000000002757000-memory.dmpFilesize
12KB
-
memory/912-69-0x000007FEEAE60000-0x000007FEEB9BD000-memory.dmpFilesize
11.4MB
-
memory/912-73-0x000000000275B000-0x000000000277A000-memory.dmpFilesize
124KB
-
memory/1000-184-0x0000000000540000-0x00000000005E8000-memory.dmpFilesize
672KB
-
memory/1000-185-0x0000000004D80000-0x0000000004E12000-memory.dmpFilesize
584KB
-
memory/1000-177-0x0000000001040000-0x000000000107E000-memory.dmpFilesize
248KB
-
memory/1000-174-0x0000000000000000-mapping.dmp
-
memory/1136-120-0x0000000000000000-mapping.dmp
-
memory/1208-138-0x0000000000960000-0x0000000000A36000-memory.dmpFilesize
856KB
-
memory/1208-139-0x0000000000960000-0x0000000000A36000-memory.dmpFilesize
856KB
-
memory/1208-142-0x0000000000960000-0x0000000000A36000-memory.dmpFilesize
856KB
-
memory/1208-146-0x00000000001C0000-0x0000000000206000-memory.dmpFilesize
280KB
-
memory/1208-145-0x0000000000960000-0x0000000000A36000-memory.dmpFilesize
856KB
-
memory/1208-136-0x0000000000000000-mapping.dmp
-
memory/1208-140-0x0000000000960000-0x0000000000A36000-memory.dmpFilesize
856KB
-
memory/1208-143-0x0000000076DE0000-0x0000000076E8C000-memory.dmpFilesize
688KB
-
memory/1484-60-0x00000000027F4000-0x00000000027F7000-memory.dmpFilesize
12KB
-
memory/1484-56-0x0000000000000000-mapping.dmp
-
memory/1484-59-0x000007FEECB70000-0x000007FEED6CD000-memory.dmpFilesize
11.4MB
-
memory/1484-61-0x000000001B8A0000-0x000000001BB9F000-memory.dmpFilesize
3.0MB
-
memory/1484-62-0x00000000027FB000-0x000000000281A000-memory.dmpFilesize
124KB
-
memory/1484-63-0x00000000027F4000-0x00000000027F7000-memory.dmpFilesize
12KB
-
memory/1648-54-0x0000000000BB0000-0x0000000000EFE000-memory.dmpFilesize
3.3MB
-
memory/1648-71-0x000000001B247000-0x000000001B266000-memory.dmpFilesize
124KB
-
memory/1648-89-0x000000001B247000-0x000000001B266000-memory.dmpFilesize
124KB
-
memory/1648-64-0x000000001C430000-0x000000001C72A000-memory.dmpFilesize
3.0MB
-
memory/1648-55-0x000007FEFB931000-0x000007FEFB933000-memory.dmpFilesize
8KB
-
memory/1824-150-0x0000000000000000-mapping.dmp
-
memory/1920-159-0x0000000076750000-0x0000000076769000-memory.dmpFilesize
100KB
-
memory/1920-181-0x00000000002C0000-0x0000000000306000-memory.dmpFilesize
280KB
-
memory/1920-134-0x00000000766B0000-0x000000007673F000-memory.dmpFilesize
572KB
-
memory/1920-132-0x00000000751E0000-0x0000000075237000-memory.dmpFilesize
348KB
-
memory/1920-131-0x0000000075370000-0x00000000754CC000-memory.dmpFilesize
1.4MB
-
memory/1920-125-0x00000000767B0000-0x00000000767F7000-memory.dmpFilesize
284KB
-
memory/1920-126-0x0000000076770000-0x00000000767A5000-memory.dmpFilesize
212KB
-
memory/1920-124-0x00000000002C0000-0x0000000000306000-memory.dmpFilesize
280KB
-
memory/1920-118-0x0000000000960000-0x0000000000A36000-memory.dmpFilesize
856KB
-
memory/1920-122-0x0000000000960000-0x0000000000A36000-memory.dmpFilesize
856KB
-
memory/1920-123-0x0000000000960000-0x0000000000A36000-memory.dmpFilesize
856KB
-
memory/1920-147-0x0000000074960000-0x0000000074A55000-memory.dmpFilesize
980KB
-
memory/1920-182-0x00000000767B0000-0x00000000767F7000-memory.dmpFilesize
284KB
-
memory/1920-119-0x0000000000960000-0x0000000000A36000-memory.dmpFilesize
856KB
-
memory/1920-121-0x0000000000960000-0x0000000000A36000-memory.dmpFilesize
856KB
-
memory/1920-116-0x0000000076DE0000-0x0000000076E8C000-memory.dmpFilesize
688KB
-
memory/1920-153-0x0000000075560000-0x000000007556C000-memory.dmpFilesize
48KB
-
memory/1920-155-0x0000000074A90000-0x0000000074A9B000-memory.dmpFilesize
44KB
-
memory/1920-154-0x0000000076C30000-0x0000000076D4D000-memory.dmpFilesize
1.1MB
-
memory/1920-115-0x0000000000960000-0x0000000000A36000-memory.dmpFilesize
856KB
-
memory/1920-157-0x0000000074EE0000-0x0000000074F0D000-memory.dmpFilesize
180KB
-
memory/1920-162-0x0000000074E90000-0x0000000074ED5000-memory.dmpFilesize
276KB
-
memory/1920-168-0x0000000075240000-0x0000000075267000-memory.dmpFilesize
156KB
-
memory/1920-166-0x0000000074CA0000-0x0000000074CAC000-memory.dmpFilesize
48KB
-
memory/1920-169-0x0000000076AE0000-0x0000000076AF2000-memory.dmpFilesize
72KB
-
memory/1920-170-0x0000000075570000-0x000000007570D000-memory.dmpFilesize
1.6MB
-
memory/1920-112-0x0000000000960000-0x0000000000A36000-memory.dmpFilesize
856KB
-
memory/1920-111-0x0000000000960000-0x0000000000A36000-memory.dmpFilesize
856KB
-
memory/1920-135-0x00000000767B0000-0x00000000767F7000-memory.dmpFilesize
284KB
-
memory/1920-110-0x0000000000960000-0x0000000000A36000-memory.dmpFilesize
856KB
-
memory/1920-105-0x0000000000000000-mapping.dmp
-
memory/1920-178-0x0000000000960000-0x0000000000A36000-memory.dmpFilesize
856KB
-
memory/1920-179-0x0000000000960000-0x0000000000A36000-memory.dmpFilesize
856KB
-
memory/1920-180-0x0000000000960000-0x0000000000A36000-memory.dmpFilesize
856KB
-
memory/1976-84-0x0000000140000000-0x00000001401ED000-memory.dmpFilesize
1.9MB
-
memory/1976-90-0x0000000140000000-0x00000001401ED000-memory.dmpFilesize
1.9MB
-
memory/1976-88-0x0000000140000000-0x00000001401ED000-memory.dmpFilesize
1.9MB
-
memory/1976-86-0x00000001400080C0-mapping.dmp
-
memory/1976-85-0x0000000140000000-0x00000001401ED000-memory.dmpFilesize
1.9MB
-
memory/1976-114-0x0000000140000000-0x00000001401ED000-memory.dmpFilesize
1.9MB
-
memory/1976-82-0x0000000140000000-0x00000001401ED000-memory.dmpFilesize
1.9MB
-
memory/1976-80-0x0000000140000000-0x00000001401ED000-memory.dmpFilesize
1.9MB
-
memory/1976-78-0x0000000140000000-0x00000001401ED000-memory.dmpFilesize
1.9MB
-
memory/1976-79-0x0000000140000000-0x00000001401ED000-memory.dmpFilesize
1.9MB
-
memory/1976-76-0x0000000140000000-0x00000001401ED000-memory.dmpFilesize
1.9MB
-
memory/1976-75-0x0000000140000000-0x00000001401ED000-memory.dmpFilesize
1.9MB
-
memory/2016-148-0x0000000000000000-mapping.dmp