Analysis
-
max time kernel
114s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-09-2022 14:23
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
tmp.exe
-
Size
1018KB
-
MD5
f58357e2f32909d85790128c9f6d08c0
-
SHA1
b75dea10a3f9ebcce95c2dbf9d20a98fe3c5bd78
-
SHA256
462342db316acd9578f80e1b80471237fecc9479d2d70f7f413b1b47cd302400
-
SHA512
52aec13d3af40f0396a31ed278f3d243bf3eb6bebaac425bd8cc050cf399e47eb1e6ec851eb024c56d4ccc1d76d958aa2ba87ec94e2a7e72c9bf6484cdf949d8
-
SSDEEP
12288:ithx+HhW51Ur3EUfGTLX+fw0aSdpjRAvqYzlJLO/xbf:aD4h/jtfw0PmzlJLO/hf
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 3 IoCs
Processes:
aajrpy.exemnzjfp.exetmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\Meow\\Meow.exe\"," aajrpy.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\SystemVisual\\VisualStudio.exe\"," mnzjfp.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\SystemCPU\\CPU-SOCKET.exe\"," tmp.exe -
Async RAT payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1988-62-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1988-61-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1988-63-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1988-64-0x000000000040C79E-mapping.dmp asyncrat behavioral1/memory/1988-66-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1988-68-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1988-70-0x0000000000540000-0x000000000054C000-memory.dmp asyncrat -
Executes dropped EXE 3 IoCs
Processes:
aajrpy.exemnzjfp.exerlfhwc.exepid process 1892 aajrpy.exe 1188 mnzjfp.exe 1264 rlfhwc.exe -
Loads dropped DLL 3 IoCs
Processes:
powershell.exepowershell.exepowershell.exepid process 1916 powershell.exe 1740 powershell.exe 240 powershell.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
tmp.exeaajrpy.exemnzjfp.exedescription pid process target process PID 532 set thread context of 1988 532 tmp.exe RegAsm.exe PID 1892 set thread context of 1616 1892 aajrpy.exe RegAsm.exe PID 1188 set thread context of 832 1188 mnzjfp.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
InstallUtil.exepid process 832 InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
powershell.exeRegAsm.exeaajrpy.exepowershell.exepowershell.exepowershell.exemnzjfp.exepowershell.exepid process 1916 powershell.exe 1988 RegAsm.exe 1916 powershell.exe 1916 powershell.exe 1892 aajrpy.exe 1892 aajrpy.exe 1740 powershell.exe 1740 powershell.exe 1740 powershell.exe 1988 RegAsm.exe 1136 powershell.exe 240 powershell.exe 240 powershell.exe 240 powershell.exe 1988 RegAsm.exe 1188 mnzjfp.exe 1188 mnzjfp.exe 1012 powershell.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
tmp.exeRegAsm.exepowershell.exeaajrpy.exepowershell.exemnzjfp.exepowershell.exepowershell.exerlfhwc.exepowershell.exedescription pid process Token: SeDebugPrivilege 532 tmp.exe Token: SeDebugPrivilege 1988 RegAsm.exe Token: SeDebugPrivilege 1916 powershell.exe Token: SeDebugPrivilege 1892 aajrpy.exe Token: SeDebugPrivilege 1740 powershell.exe Token: SeDebugPrivilege 1188 mnzjfp.exe Token: SeDebugPrivilege 1136 powershell.exe Token: SeDebugPrivilege 240 powershell.exe Token: SeDebugPrivilege 1264 rlfhwc.exe Token: SeDebugPrivilege 1012 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
tmp.exeRegAsm.execmd.exepowershell.exeaajrpy.execmd.exepowershell.exemnzjfp.execmd.exepowershell.exedescription pid process target process PID 532 wrote to memory of 1988 532 tmp.exe RegAsm.exe PID 532 wrote to memory of 1988 532 tmp.exe RegAsm.exe PID 532 wrote to memory of 1988 532 tmp.exe RegAsm.exe PID 532 wrote to memory of 1988 532 tmp.exe RegAsm.exe PID 532 wrote to memory of 1988 532 tmp.exe RegAsm.exe PID 532 wrote to memory of 1988 532 tmp.exe RegAsm.exe PID 532 wrote to memory of 1988 532 tmp.exe RegAsm.exe PID 532 wrote to memory of 1988 532 tmp.exe RegAsm.exe PID 532 wrote to memory of 1988 532 tmp.exe RegAsm.exe PID 532 wrote to memory of 1988 532 tmp.exe RegAsm.exe PID 532 wrote to memory of 1988 532 tmp.exe RegAsm.exe PID 532 wrote to memory of 1988 532 tmp.exe RegAsm.exe PID 1988 wrote to memory of 1644 1988 RegAsm.exe cmd.exe PID 1988 wrote to memory of 1644 1988 RegAsm.exe cmd.exe PID 1988 wrote to memory of 1644 1988 RegAsm.exe cmd.exe PID 1988 wrote to memory of 1644 1988 RegAsm.exe cmd.exe PID 1644 wrote to memory of 1916 1644 cmd.exe powershell.exe PID 1644 wrote to memory of 1916 1644 cmd.exe powershell.exe PID 1644 wrote to memory of 1916 1644 cmd.exe powershell.exe PID 1644 wrote to memory of 1916 1644 cmd.exe powershell.exe PID 1916 wrote to memory of 1892 1916 powershell.exe aajrpy.exe PID 1916 wrote to memory of 1892 1916 powershell.exe aajrpy.exe PID 1916 wrote to memory of 1892 1916 powershell.exe aajrpy.exe PID 1916 wrote to memory of 1892 1916 powershell.exe aajrpy.exe PID 1892 wrote to memory of 1616 1892 aajrpy.exe RegAsm.exe PID 1892 wrote to memory of 1616 1892 aajrpy.exe RegAsm.exe PID 1892 wrote to memory of 1616 1892 aajrpy.exe RegAsm.exe PID 1892 wrote to memory of 1616 1892 aajrpy.exe RegAsm.exe PID 1892 wrote to memory of 1616 1892 aajrpy.exe RegAsm.exe PID 1892 wrote to memory of 1616 1892 aajrpy.exe RegAsm.exe PID 1892 wrote to memory of 1616 1892 aajrpy.exe RegAsm.exe PID 1892 wrote to memory of 1616 1892 aajrpy.exe RegAsm.exe PID 1892 wrote to memory of 1616 1892 aajrpy.exe RegAsm.exe PID 1892 wrote to memory of 1616 1892 aajrpy.exe RegAsm.exe PID 1988 wrote to memory of 1608 1988 RegAsm.exe cmd.exe PID 1988 wrote to memory of 1608 1988 RegAsm.exe cmd.exe PID 1988 wrote to memory of 1608 1988 RegAsm.exe cmd.exe PID 1988 wrote to memory of 1608 1988 RegAsm.exe cmd.exe PID 1608 wrote to memory of 1740 1608 cmd.exe powershell.exe PID 1608 wrote to memory of 1740 1608 cmd.exe powershell.exe PID 1608 wrote to memory of 1740 1608 cmd.exe powershell.exe PID 1608 wrote to memory of 1740 1608 cmd.exe powershell.exe PID 1740 wrote to memory of 1188 1740 powershell.exe mnzjfp.exe PID 1740 wrote to memory of 1188 1740 powershell.exe mnzjfp.exe PID 1740 wrote to memory of 1188 1740 powershell.exe mnzjfp.exe PID 1740 wrote to memory of 1188 1740 powershell.exe mnzjfp.exe PID 1188 wrote to memory of 1136 1188 mnzjfp.exe powershell.exe PID 1188 wrote to memory of 1136 1188 mnzjfp.exe powershell.exe PID 1188 wrote to memory of 1136 1188 mnzjfp.exe powershell.exe PID 1188 wrote to memory of 1136 1188 mnzjfp.exe powershell.exe PID 1988 wrote to memory of 468 1988 RegAsm.exe cmd.exe PID 1988 wrote to memory of 468 1988 RegAsm.exe cmd.exe PID 1988 wrote to memory of 468 1988 RegAsm.exe cmd.exe PID 1988 wrote to memory of 468 1988 RegAsm.exe cmd.exe PID 468 wrote to memory of 240 468 cmd.exe powershell.exe PID 468 wrote to memory of 240 468 cmd.exe powershell.exe PID 468 wrote to memory of 240 468 cmd.exe powershell.exe PID 468 wrote to memory of 240 468 cmd.exe powershell.exe PID 240 wrote to memory of 1264 240 powershell.exe rlfhwc.exe PID 240 wrote to memory of 1264 240 powershell.exe rlfhwc.exe PID 240 wrote to memory of 1264 240 powershell.exe rlfhwc.exe PID 240 wrote to memory of 1264 240 powershell.exe rlfhwc.exe PID 1188 wrote to memory of 1720 1188 mnzjfp.exe InstallUtil.exe PID 1188 wrote to memory of 1720 1188 mnzjfp.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\aajrpy.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\aajrpy.exe"'4⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\aajrpy.exe"C:\Users\Admin\AppData\Local\Temp\aajrpy.exe"5⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe6⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\mnzjfp.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\mnzjfp.exe"'4⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\mnzjfp.exe"C:\Users\Admin\AppData\Local\Temp\mnzjfp.exe"5⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAwADsAIABTAGUAdAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAJwBDADoAXAAnAA==6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe6⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe6⤵
- Suspicious behavior: AddClipboardFormatListener
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\rlfhwc.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\rlfhwc.exe"'4⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\rlfhwc.exe"C:\Users\Admin\AppData\Local\Temp\rlfhwc.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskeng.exetaskeng.exe {24E1F50A-1482-46AA-95EF-CBFB9BEB3743} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:S4U:1⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc UwBlAHQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\aajrpy.exeFilesize
828KB
MD5494969d84ee004227da4051403cbc098
SHA1befd216439b68c83899476ea7bf5c7eff025bdc6
SHA256c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48
SHA512ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676
-
C:\Users\Admin\AppData\Local\Temp\aajrpy.exeFilesize
828KB
MD5494969d84ee004227da4051403cbc098
SHA1befd216439b68c83899476ea7bf5c7eff025bdc6
SHA256c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48
SHA512ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676
-
C:\Users\Admin\AppData\Local\Temp\mnzjfp.exeFilesize
1.0MB
MD57217f672995942607eba0cd4fb1bb117
SHA1c0079cdb09360d3e2e9f449035f38c9dad5cad1d
SHA256ed18053ff11ef58b9ec9c8cf2d7e999dd72effba8c4558b0c7e50b081caae4e1
SHA512d642540a341d8d982bb808b576f4153922c5d0118fa8d314d81b9bc362035773bc26fff2cd5f6204d3ed3f58312f365f3b81f918cb03094534b7b0b16eb503c2
-
C:\Users\Admin\AppData\Local\Temp\mnzjfp.exeFilesize
1.0MB
MD57217f672995942607eba0cd4fb1bb117
SHA1c0079cdb09360d3e2e9f449035f38c9dad5cad1d
SHA256ed18053ff11ef58b9ec9c8cf2d7e999dd72effba8c4558b0c7e50b081caae4e1
SHA512d642540a341d8d982bb808b576f4153922c5d0118fa8d314d81b9bc362035773bc26fff2cd5f6204d3ed3f58312f365f3b81f918cb03094534b7b0b16eb503c2
-
C:\Users\Admin\AppData\Local\Temp\rlfhwc.exeFilesize
493KB
MD5acba20ad390f3688738f688f262adf63
SHA1b732d2ffafa3b6237c3fe40d3172497bf556df6e
SHA2561b47454a02aee81578865fc1b2ae9545392544073c8dca9eb399b53d402bd877
SHA5126b044f95566581a9f2f9c7bc0ea9bc032072c0bc099035d388e86ce1c1a3bf963366c7b5e221acf3602a1bb8c5a9c425a8c783d27d4a927f3dc978f222091a14
-
C:\Users\Admin\AppData\Local\Temp\rlfhwc.exeFilesize
493KB
MD5acba20ad390f3688738f688f262adf63
SHA1b732d2ffafa3b6237c3fe40d3172497bf556df6e
SHA2561b47454a02aee81578865fc1b2ae9545392544073c8dca9eb399b53d402bd877
SHA5126b044f95566581a9f2f9c7bc0ea9bc032072c0bc099035d388e86ce1c1a3bf963366c7b5e221acf3602a1bb8c5a9c425a8c783d27d4a927f3dc978f222091a14
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD551678134d052bcbc59838b57243e1f06
SHA1b5a94ddb4ee7d38f37280e88ec8f7015ecda089d
SHA256338e44d462db1df95c285b14199384fb561c9ecbf48b557a3c43d1b88c48ff86
SHA51285d9314c1a3b684c151fff5c1e214657e21099ef847d3da12c25be82243ee225db857dbe4cb87d06e0476fdb29dc8f2df634e0dce7d4687b9e37494aaa2be986
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD551678134d052bcbc59838b57243e1f06
SHA1b5a94ddb4ee7d38f37280e88ec8f7015ecda089d
SHA256338e44d462db1df95c285b14199384fb561c9ecbf48b557a3c43d1b88c48ff86
SHA51285d9314c1a3b684c151fff5c1e214657e21099ef847d3da12c25be82243ee225db857dbe4cb87d06e0476fdb29dc8f2df634e0dce7d4687b9e37494aaa2be986
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-msFilesize
7KB
MD551678134d052bcbc59838b57243e1f06
SHA1b5a94ddb4ee7d38f37280e88ec8f7015ecda089d
SHA256338e44d462db1df95c285b14199384fb561c9ecbf48b557a3c43d1b88c48ff86
SHA51285d9314c1a3b684c151fff5c1e214657e21099ef847d3da12c25be82243ee225db857dbe4cb87d06e0476fdb29dc8f2df634e0dce7d4687b9e37494aaa2be986
-
\Users\Admin\AppData\Local\Temp\aajrpy.exeFilesize
828KB
MD5494969d84ee004227da4051403cbc098
SHA1befd216439b68c83899476ea7bf5c7eff025bdc6
SHA256c92db9ae788154a5b6f08a648e663000803dfba5aa893cfaef69b18c06d7fc48
SHA512ddc6d8745fb4b5c89990da7e85c5475a1fe91ece05b127258c85ad78d63a137a383bbf5a798c1b54d49d7506b53c03677bafa17ef7c8080f8f5bde1ebf552676
-
\Users\Admin\AppData\Local\Temp\mnzjfp.exeFilesize
1.0MB
MD57217f672995942607eba0cd4fb1bb117
SHA1c0079cdb09360d3e2e9f449035f38c9dad5cad1d
SHA256ed18053ff11ef58b9ec9c8cf2d7e999dd72effba8c4558b0c7e50b081caae4e1
SHA512d642540a341d8d982bb808b576f4153922c5d0118fa8d314d81b9bc362035773bc26fff2cd5f6204d3ed3f58312f365f3b81f918cb03094534b7b0b16eb503c2
-
\Users\Admin\AppData\Local\Temp\rlfhwc.exeFilesize
493KB
MD5acba20ad390f3688738f688f262adf63
SHA1b732d2ffafa3b6237c3fe40d3172497bf556df6e
SHA2561b47454a02aee81578865fc1b2ae9545392544073c8dca9eb399b53d402bd877
SHA5126b044f95566581a9f2f9c7bc0ea9bc032072c0bc099035d388e86ce1c1a3bf963366c7b5e221acf3602a1bb8c5a9c425a8c783d27d4a927f3dc978f222091a14
-
memory/240-116-0x0000000000000000-mapping.dmp
-
memory/240-126-0x000000006D4E0000-0x000000006DA8B000-memory.dmpFilesize
5.7MB
-
memory/468-115-0x0000000000000000-mapping.dmp
-
memory/532-56-0x0000000075091000-0x0000000075093000-memory.dmpFilesize
8KB
-
memory/532-57-0x00000000010B0000-0x0000000001142000-memory.dmpFilesize
584KB
-
memory/532-54-0x0000000001270000-0x0000000001374000-memory.dmpFilesize
1.0MB
-
memory/532-55-0x0000000000A00000-0x0000000000AAC000-memory.dmpFilesize
688KB
-
memory/832-136-0x0000000000400000-0x0000000000436000-memory.dmpFilesize
216KB
-
memory/832-142-0x0000000000400000-0x0000000000436000-memory.dmpFilesize
216KB
-
memory/832-134-0x0000000000400000-0x0000000000436000-memory.dmpFilesize
216KB
-
memory/832-132-0x0000000000400000-0x0000000000436000-memory.dmpFilesize
216KB
-
memory/832-131-0x0000000000400000-0x0000000000436000-memory.dmpFilesize
216KB
-
memory/832-137-0x0000000000400000-0x0000000000436000-memory.dmpFilesize
216KB
-
memory/832-138-0x000000000040504E-mapping.dmp
-
memory/832-140-0x0000000000400000-0x0000000000436000-memory.dmpFilesize
216KB
-
memory/1012-146-0x000007FEFB751000-0x000007FEFB753000-memory.dmpFilesize
8KB
-
memory/1012-150-0x0000000000FAB000-0x0000000000FCA000-memory.dmpFilesize
124KB
-
memory/1012-145-0x0000000000000000-mapping.dmp
-
memory/1012-152-0x0000000000FAB000-0x0000000000FCA000-memory.dmpFilesize
124KB
-
memory/1012-147-0x000007FEF33D0000-0x000007FEF3DF3000-memory.dmpFilesize
10.1MB
-
memory/1012-151-0x0000000000FA4000-0x0000000000FA7000-memory.dmpFilesize
12KB
-
memory/1012-149-0x0000000000FA4000-0x0000000000FA7000-memory.dmpFilesize
12KB
-
memory/1012-148-0x000007FEF2870000-0x000007FEF33CD000-memory.dmpFilesize
11.4MB
-
memory/1136-111-0x0000000000000000-mapping.dmp
-
memory/1136-120-0x000000006D4E0000-0x000000006DA8B000-memory.dmpFilesize
5.7MB
-
memory/1136-114-0x000000006D4E0000-0x000000006DA8B000-memory.dmpFilesize
5.7MB
-
memory/1188-109-0x0000000000B60000-0x0000000000BA8000-memory.dmpFilesize
288KB
-
memory/1188-104-0x0000000000000000-mapping.dmp
-
memory/1188-107-0x0000000000C80000-0x0000000000D92000-memory.dmpFilesize
1.1MB
-
memory/1188-108-0x00000000005C0000-0x0000000000676000-memory.dmpFilesize
728KB
-
memory/1264-125-0x0000000000440000-0x00000000004EE000-memory.dmpFilesize
696KB
-
memory/1264-144-0x0000000001090000-0x00000000010E4000-memory.dmpFilesize
336KB
-
memory/1264-130-0x0000000000CA0000-0x0000000000CEC000-memory.dmpFilesize
304KB
-
memory/1264-129-0x0000000000770000-0x00000000007C4000-memory.dmpFilesize
336KB
-
memory/1264-127-0x0000000000690000-0x00000000006E6000-memory.dmpFilesize
344KB
-
memory/1264-124-0x0000000001210000-0x0000000001292000-memory.dmpFilesize
520KB
-
memory/1264-122-0x0000000000000000-mapping.dmp
-
memory/1608-97-0x0000000000000000-mapping.dmp
-
memory/1616-92-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/1616-90-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/1616-89-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/1616-95-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/1616-87-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/1616-85-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/1616-83-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/1616-96-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/1616-82-0x0000000140000000-0x00000001400D9000-memory.dmpFilesize
868KB
-
memory/1616-93-0x0000000140095CF4-mapping.dmp
-
memory/1644-71-0x0000000000000000-mapping.dmp
-
memory/1740-106-0x000000006E320000-0x000000006E8CB000-memory.dmpFilesize
5.7MB
-
memory/1740-101-0x000000006E320000-0x000000006E8CB000-memory.dmpFilesize
5.7MB
-
memory/1740-98-0x0000000000000000-mapping.dmp
-
memory/1892-80-0x000000013F4F0000-0x000000013F5C2000-memory.dmpFilesize
840KB
-
memory/1892-77-0x0000000000000000-mapping.dmp
-
memory/1892-81-0x000000001A8C0000-0x000000001A984000-memory.dmpFilesize
784KB
-
memory/1916-74-0x000000006E5D0000-0x000000006EB7B000-memory.dmpFilesize
5.7MB
-
memory/1916-72-0x0000000000000000-mapping.dmp
-
memory/1916-79-0x000000006E5D0000-0x000000006EB7B000-memory.dmpFilesize
5.7MB
-
memory/1988-70-0x0000000000540000-0x000000000054C000-memory.dmpFilesize
48KB
-
memory/1988-68-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1988-66-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1988-64-0x000000000040C79E-mapping.dmp
-
memory/1988-63-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1988-61-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1988-62-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1988-59-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1988-58-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB