Analysis
-
max time kernel
162s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2022 19:20
Static task
static1
Behavioral task
behavioral1
Sample
6897445707/6897445707.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6897445707/6897445707.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
6897445707/terms_conditions_of_carriage_it.pdf
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
6897445707/terms_conditions_of_carriage_it.pdf
Resource
win10v2004-20220812-en
General
-
Target
6897445707/6897445707.exe
-
Size
839KB
-
MD5
381cdc135c6e06969d270fd7e754d148
-
SHA1
649ee25900a10b1cf567ca867489658be44a3629
-
SHA256
6c51e2ce3f46927b7b8bc3a559980136e6fdf05bcdf6d84294a0e64fe9adf56b
-
SHA512
faceefe7b56408c6e187f72871cb55fbf0e4490ce92d886189551facc7292b412dc0d49d7fa67e5e7efc061c39707c9a401b8058253e9b2ca77fa1341ca260b0
-
SSDEEP
24576:e7eYV4ukDeT876VCMNh39DMPsnjDIP3j:O86kqLnjDIP
Malware Config
Extracted
formbook
od65
oMDl7+9m1JtQ+KJ//bSZYk7C
0nQRVuikEsWM9KcRhRk=
VXATJsbZt/OyEi6Z0Y9m9O4=
C8ZitXuEXIk613jZWQ==
4IIRKYI2mygmEr7EUhOuiEZ1ux4c
x3mNjz4y4M20lnKM1I9m9O4=
UGB//3QuqmDHeDQ=
2H5k5/UwHEwPv2G+Sg==
xHh+uLvyCnZdPo0YXdyEe+ZowQ==
MMGT27gl8VFJ
pLA/Ve3++kcn1lhn6dDmhI2KGzfKNYU=
Ic/vJ/dG0uDhkYblI6XXFL0SN8cDrZP5
MfKDkw/woqFDCabB0YIs
IsDCzc1GuJOGdqX4CgCAPA==
bROVz2hP/wgV9/eGkw4=
cyM+htBboyUeyj0qbuqNTrhX9gJF/6fx
Q+MDF9cCCn8pkyU5y7fmPwYagMMGB7jx
Ve57nDZMRqeXP+V+0IMu
vmJrjeIXWfXWuZbB0YIs
5qVAfUZyi/sC13jZWQ==
NmiU4T7nYX0x6fJ17a7PmWhcKMo=
kK5LUcCAJDHshaFEyMHsNeY=
lEpmo6kl8VFJ
6ATMHDa/DINAdiQK
jz5XhZL2PduGNO3G1I9m9O4=
mSNB1J9zci/VNA==
kFbzCVDrQfnCIJ3B0YIs
rEbD53hwVJVAdiQK
1/CK163mEa121kAkZ+uepxeS2A==
+7Pf7bMl8VFJ
Yoo5bumqT1JkTAfX7WBW4dS1HxOyQI8=
QvYSNwovL5GCLJ/B0YIs
DbvE7/JDRHtDtMho964n8K+G9kJWDw==
fpYkThtoqmVaQFSr9reCuWNcKMo=
ypArNtTty9bVr5iDvT/krGDY9kJWDw==
oFxwvv960JOOdHdKhgQ=
OekWK+T36z8KvvNYc96ZYk7C
ROzyNHcCYAatZ3dKhgQ=
cAilwxjge2RVMvbdayeziEd1ux4c
c5pFdQLkm5KCMzKO49KFe+ZowQ==
LuQJSmTNDa1hy15zb+1raE/K
bxgjYmy721xxWu/EFcdnbnHY9kJWDw==
SuTqDReY670tjxIYK5+sMOUCacI=
ikDS/oh6ci/VNA==
APP7L4APbAOuA6cRhRk=
LtQACYFEwW7ukPnIHwY=
D0VpdXnS6WYQzOOBlUqz6ug=
9g+Y3/JjpTAsDKrB0YIs
/axBa+KWIAOmGivACgCAPA==
UBIsXW3MBoBAdiQK
JMsqt8+XMzPjTjN/hgCSk0jds3MDrZP5
fDKszl1ICyHbOCiN0Y9m9O4=
bngDHcvMrfbGNBW18oQ7
aAoYNzuo+6ZRAfeGkw4=
Rf0SWbRc1Icx4Zl0jA1CikZ1ux4c
43KMu4R9ci/VNA==
lMRjo4rXA5deyks2gPZiM/dxds4DrZP5
x2nqBJyXVVxmFhevNe14e+ZowQ==
LNJ8gpABQ9bxzxCc6KeZYk7C
IbZEawkiHmMnmHva+XQW2pMWZojCvPsrJw==
i7hBQNDFgYWGOjfCCgCAPA==
7pQtM3QdlFocB6OSRA==
WWV4rPrDeouLe0TUUw==
fgckl1Utr2DHeDQ=
astrobudka.net
Extracted
xloader
3.8
od65
oMDl7+9m1JtQ+KJ//bSZYk7C
0nQRVuikEsWM9KcRhRk=
VXATJsbZt/OyEi6Z0Y9m9O4=
C8ZitXuEXIk613jZWQ==
4IIRKYI2mygmEr7EUhOuiEZ1ux4c
x3mNjz4y4M20lnKM1I9m9O4=
UGB//3QuqmDHeDQ=
2H5k5/UwHEwPv2G+Sg==
xHh+uLvyCnZdPo0YXdyEe+ZowQ==
MMGT27gl8VFJ
pLA/Ve3++kcn1lhn6dDmhI2KGzfKNYU=
Ic/vJ/dG0uDhkYblI6XXFL0SN8cDrZP5
MfKDkw/woqFDCabB0YIs
IsDCzc1GuJOGdqX4CgCAPA==
bROVz2hP/wgV9/eGkw4=
cyM+htBboyUeyj0qbuqNTrhX9gJF/6fx
Q+MDF9cCCn8pkyU5y7fmPwYagMMGB7jx
Ve57nDZMRqeXP+V+0IMu
vmJrjeIXWfXWuZbB0YIs
5qVAfUZyi/sC13jZWQ==
NmiU4T7nYX0x6fJ17a7PmWhcKMo=
kK5LUcCAJDHshaFEyMHsNeY=
lEpmo6kl8VFJ
6ATMHDa/DINAdiQK
jz5XhZL2PduGNO3G1I9m9O4=
mSNB1J9zci/VNA==
kFbzCVDrQfnCIJ3B0YIs
rEbD53hwVJVAdiQK
1/CK163mEa121kAkZ+uepxeS2A==
+7Pf7bMl8VFJ
Yoo5bumqT1JkTAfX7WBW4dS1HxOyQI8=
QvYSNwovL5GCLJ/B0YIs
DbvE7/JDRHtDtMho964n8K+G9kJWDw==
fpYkThtoqmVaQFSr9reCuWNcKMo=
ypArNtTty9bVr5iDvT/krGDY9kJWDw==
oFxwvv960JOOdHdKhgQ=
OekWK+T36z8KvvNYc96ZYk7C
ROzyNHcCYAatZ3dKhgQ=
cAilwxjge2RVMvbdayeziEd1ux4c
c5pFdQLkm5KCMzKO49KFe+ZowQ==
LuQJSmTNDa1hy15zb+1raE/K
bxgjYmy721xxWu/EFcdnbnHY9kJWDw==
SuTqDReY670tjxIYK5+sMOUCacI=
ikDS/oh6ci/VNA==
APP7L4APbAOuA6cRhRk=
LtQACYFEwW7ukPnIHwY=
D0VpdXnS6WYQzOOBlUqz6ug=
9g+Y3/JjpTAsDKrB0YIs
/axBa+KWIAOmGivACgCAPA==
UBIsXW3MBoBAdiQK
JMsqt8+XMzPjTjN/hgCSk0jds3MDrZP5
fDKszl1ICyHbOCiN0Y9m9O4=
bngDHcvMrfbGNBW18oQ7
aAoYNzuo+6ZRAfeGkw4=
Rf0SWbRc1Icx4Zl0jA1CikZ1ux4c
43KMu4R9ci/VNA==
lMRjo4rXA5deyks2gPZiM/dxds4DrZP5
x2nqBJyXVVxmFhevNe14e+ZowQ==
LNJ8gpABQ9bxzxCc6KeZYk7C
IbZEawkiHmMnmHva+XQW2pMWZojCvPsrJw==
i7hBQNDFgYWGOjfCCgCAPA==
7pQtM3QdlFocB6OSRA==
WWV4rPrDeouLe0TUUw==
fgckl1Utr2DHeDQ=
astrobudka.net
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 64 IoCs
Processes:
resource yara_rule behavioral2/memory/2032-132-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-134-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-133-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-135-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-136-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-139-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-138-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-137-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-140-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-142-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-141-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-143-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-144-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-145-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-147-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-148-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-149-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-146-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-151-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-150-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-152-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-153-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-154-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-155-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-156-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-157-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-159-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-158-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-160-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-163-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-162-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-161-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-164-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-167-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-166-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-165-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-168-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-169-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-170-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-171-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-172-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-173-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-174-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-175-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-176-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-177-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-178-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-179-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-180-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-181-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-182-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-183-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-184-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-185-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-186-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-187-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-188-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-189-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-190-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-191-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-193-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-192-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-194-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 behavioral2/memory/2032-195-0x0000000003FD0000-0x0000000003FF5000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6897445707.execmd.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 6897445707.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
6897445707.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Uzvtgrkq = "C:\\Users\\Public\\Libraries\\qkrgtvzU.url" 6897445707.exe -
Drops file in System32 directory 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{250B1DEC-FAC2-4560-9F2E-089AF99A3272}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{59636ABC-99D4-4F0F-9C04-68FD2B8C4084}.catalogItem svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
cmd.exemsdt.exedescription pid process target process PID 2176 set thread context of 3004 2176 cmd.exe Explorer.EXE PID 408 set thread context of 3004 408 msdt.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Processes:
msdt.exedescription ioc process Key created \Registry\User\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msdt.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
6897445707.execmd.exemsdt.exepid process 2032 6897445707.exe 2032 6897445707.exe 2176 cmd.exe 2176 cmd.exe 2176 cmd.exe 2176 cmd.exe 2176 cmd.exe 2176 cmd.exe 2176 cmd.exe 2176 cmd.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3004 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
cmd.exemsdt.exepid process 2176 cmd.exe 2176 cmd.exe 2176 cmd.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe 408 msdt.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
cmd.exeExplorer.EXEmsdt.exedescription pid process Token: SeDebugPrivilege 2176 cmd.exe Token: SeShutdownPrivilege 3004 Explorer.EXE Token: SeCreatePagefilePrivilege 3004 Explorer.EXE Token: SeDebugPrivilege 408 msdt.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
6897445707.exeExplorer.EXEmsdt.exedescription pid process target process PID 2032 wrote to memory of 2176 2032 6897445707.exe cmd.exe PID 2032 wrote to memory of 2176 2032 6897445707.exe cmd.exe PID 2032 wrote to memory of 2176 2032 6897445707.exe cmd.exe PID 2032 wrote to memory of 2176 2032 6897445707.exe cmd.exe PID 2032 wrote to memory of 2176 2032 6897445707.exe cmd.exe PID 2032 wrote to memory of 2176 2032 6897445707.exe cmd.exe PID 3004 wrote to memory of 408 3004 Explorer.EXE msdt.exe PID 3004 wrote to memory of 408 3004 Explorer.EXE msdt.exe PID 3004 wrote to memory of 408 3004 Explorer.EXE msdt.exe PID 408 wrote to memory of 1784 408 msdt.exe Firefox.exe PID 408 wrote to memory of 1784 408 msdt.exe Firefox.exe PID 408 wrote to memory of 1784 408 msdt.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\6897445707\6897445707.exe"C:\Users\Admin\AppData\Local\Temp\6897445707\6897445707.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/408-361-0x0000000000000000-mapping.dmp
-
memory/408-364-0x0000000000A70000-0x0000000000AC7000-memory.dmpFilesize
348KB
-
memory/408-365-0x0000000000B20000-0x0000000000B4D000-memory.dmpFilesize
180KB
-
memory/408-366-0x0000000002D60000-0x00000000030AA000-memory.dmpFilesize
3.3MB
-
memory/408-368-0x00000000028E0000-0x000000000296F000-memory.dmpFilesize
572KB
-
memory/408-370-0x0000000000B20000-0x0000000000B4D000-memory.dmpFilesize
180KB
-
memory/2032-165-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-182-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-135-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-136-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-139-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-138-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-137-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-140-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-142-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-141-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-143-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-144-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-145-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-147-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-148-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-169-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-146-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-151-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-150-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-152-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-153-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-154-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-155-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-156-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-157-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-159-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-158-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-160-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-163-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-162-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-161-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-164-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-167-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-166-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-134-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-168-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-149-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-132-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-133-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-172-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-173-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-174-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-175-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-176-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-177-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-178-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-179-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-180-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-181-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-171-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-183-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-184-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-185-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-186-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-187-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-188-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-189-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-190-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-191-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-193-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-192-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-194-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-195-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2032-170-0x0000000003FD0000-0x0000000003FF5000-memory.dmpFilesize
148KB
-
memory/2176-355-0x0000000010410000-0x000000001043F000-memory.dmpFilesize
188KB
-
memory/2176-356-0x0000000010411000-0x000000001043F000-memory.dmpFilesize
184KB
-
memory/2176-357-0x0000000001580000-0x00000000018CA000-memory.dmpFilesize
3.3MB
-
memory/2176-359-0x0000000000DE0000-0x0000000000DF0000-memory.dmpFilesize
64KB
-
memory/2176-362-0x0000000010410000-0x000000001043F000-memory.dmpFilesize
188KB
-
memory/2176-363-0x0000000010411000-0x000000001043F000-memory.dmpFilesize
184KB
-
memory/2176-243-0x0000000000000000-mapping.dmp
-
memory/3004-360-0x0000000003620000-0x0000000003752000-memory.dmpFilesize
1.2MB
-
memory/3004-369-0x0000000008B40000-0x0000000008C77000-memory.dmpFilesize
1.2MB
-
memory/3004-367-0x0000000003620000-0x0000000003752000-memory.dmpFilesize
1.2MB
-
memory/3004-371-0x0000000008B40000-0x0000000008C77000-memory.dmpFilesize
1.2MB