Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 18:42
Static task
static1
Behavioral task
behavioral1
Sample
12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe
Resource
win7-20220812-en
General
-
Target
12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe
-
Size
1.0MB
-
MD5
03a6f05f998a2c1da3bbe3dba6f44917
-
SHA1
b9a38f68387f77ed9b752f056bda282580a52ca8
-
SHA256
12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b
-
SHA512
d45f3792eba2e04b5f1c9686ee7711f6a2edc976e4f770f34cdff86bb537aeb247d1fe0b705c5cea8860cf32245794b95f2a156597136a168e5c1a953ef929f9
-
SSDEEP
24576:jBxiZeC6Lj/mHlOdBBR6x/a2fQY5kfqFGlwpV:jLiZeC4TOOdBn0LfTqfqFJL
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
natsv.exednsmon.exepid process 1700 natsv.exe 1612 dnsmon.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exenatsv.exepid process 324 cmd.exe 1700 natsv.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
vbc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 whatismyipaddress.com 7 whatismyipaddress.com 4 whatismyipaddress.com -
Suspicious use of SetThreadContext 4 IoCs
Processes:
12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exednsmon.exeRegAsm.exedescription pid process target process PID 1488 set thread context of 1416 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe RegAsm.exe PID 1612 set thread context of 1072 1612 dnsmon.exe RegAsm.exe PID 1416 set thread context of 1512 1416 RegAsm.exe vbc.exe PID 1416 set thread context of 948 1416 RegAsm.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exenatsv.exednsmon.exepid process 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe 1612 dnsmon.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe 1612 dnsmon.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe 1612 dnsmon.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe 1612 dnsmon.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe 1612 dnsmon.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe 1612 dnsmon.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe 1612 dnsmon.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe 1612 dnsmon.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe 1612 dnsmon.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe 1612 dnsmon.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe 1612 dnsmon.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe 1612 dnsmon.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe 1612 dnsmon.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe 1612 dnsmon.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe 1612 dnsmon.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe 1612 dnsmon.exe 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe 1700 natsv.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exenatsv.exednsmon.exeRegAsm.exevbc.exevbc.exedescription pid process Token: SeDebugPrivilege 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe Token: SeDebugPrivilege 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe Token: SeDebugPrivilege 1700 natsv.exe Token: SeDebugPrivilege 1612 dnsmon.exe Token: SeDebugPrivilege 1612 dnsmon.exe Token: SeDebugPrivilege 1416 RegAsm.exe Token: SeDebugPrivilege 1512 vbc.exe Token: SeDebugPrivilege 948 vbc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegAsm.exepid process 1416 RegAsm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.execmd.exenatsv.execmd.exednsmon.exeRegAsm.exedescription pid process target process PID 1488 wrote to memory of 1624 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe cmd.exe PID 1488 wrote to memory of 1624 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe cmd.exe PID 1488 wrote to memory of 1624 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe cmd.exe PID 1488 wrote to memory of 1624 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe cmd.exe PID 1488 wrote to memory of 1416 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe RegAsm.exe PID 1488 wrote to memory of 1416 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe RegAsm.exe PID 1488 wrote to memory of 1416 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe RegAsm.exe PID 1488 wrote to memory of 1416 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe RegAsm.exe PID 1488 wrote to memory of 1416 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe RegAsm.exe PID 1488 wrote to memory of 1416 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe RegAsm.exe PID 1488 wrote to memory of 1416 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe RegAsm.exe PID 1488 wrote to memory of 1416 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe RegAsm.exe PID 1488 wrote to memory of 1416 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe RegAsm.exe PID 1488 wrote to memory of 1416 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe RegAsm.exe PID 1488 wrote to memory of 1416 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe RegAsm.exe PID 1488 wrote to memory of 1416 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe RegAsm.exe PID 1488 wrote to memory of 1416 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe RegAsm.exe PID 1488 wrote to memory of 324 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe cmd.exe PID 1488 wrote to memory of 324 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe cmd.exe PID 1488 wrote to memory of 324 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe cmd.exe PID 1488 wrote to memory of 324 1488 12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe cmd.exe PID 324 wrote to memory of 1700 324 cmd.exe natsv.exe PID 324 wrote to memory of 1700 324 cmd.exe natsv.exe PID 324 wrote to memory of 1700 324 cmd.exe natsv.exe PID 324 wrote to memory of 1700 324 cmd.exe natsv.exe PID 1700 wrote to memory of 1180 1700 natsv.exe cmd.exe PID 1700 wrote to memory of 1180 1700 natsv.exe cmd.exe PID 1700 wrote to memory of 1180 1700 natsv.exe cmd.exe PID 1700 wrote to memory of 1180 1700 natsv.exe cmd.exe PID 1180 wrote to memory of 952 1180 cmd.exe reg.exe PID 1180 wrote to memory of 952 1180 cmd.exe reg.exe PID 1180 wrote to memory of 952 1180 cmd.exe reg.exe PID 1180 wrote to memory of 952 1180 cmd.exe reg.exe PID 1700 wrote to memory of 1612 1700 natsv.exe dnsmon.exe PID 1700 wrote to memory of 1612 1700 natsv.exe dnsmon.exe PID 1700 wrote to memory of 1612 1700 natsv.exe dnsmon.exe PID 1700 wrote to memory of 1612 1700 natsv.exe dnsmon.exe PID 1612 wrote to memory of 1072 1612 dnsmon.exe RegAsm.exe PID 1612 wrote to memory of 1072 1612 dnsmon.exe RegAsm.exe PID 1612 wrote to memory of 1072 1612 dnsmon.exe RegAsm.exe PID 1612 wrote to memory of 1072 1612 dnsmon.exe RegAsm.exe PID 1612 wrote to memory of 1072 1612 dnsmon.exe RegAsm.exe PID 1612 wrote to memory of 1072 1612 dnsmon.exe RegAsm.exe PID 1612 wrote to memory of 1072 1612 dnsmon.exe RegAsm.exe PID 1612 wrote to memory of 1072 1612 dnsmon.exe RegAsm.exe PID 1612 wrote to memory of 1072 1612 dnsmon.exe RegAsm.exe PID 1612 wrote to memory of 1072 1612 dnsmon.exe RegAsm.exe PID 1612 wrote to memory of 1072 1612 dnsmon.exe RegAsm.exe PID 1612 wrote to memory of 1072 1612 dnsmon.exe RegAsm.exe PID 1612 wrote to memory of 1072 1612 dnsmon.exe RegAsm.exe PID 1416 wrote to memory of 1512 1416 RegAsm.exe vbc.exe PID 1416 wrote to memory of 1512 1416 RegAsm.exe vbc.exe PID 1416 wrote to memory of 1512 1416 RegAsm.exe vbc.exe PID 1416 wrote to memory of 1512 1416 RegAsm.exe vbc.exe PID 1416 wrote to memory of 1512 1416 RegAsm.exe vbc.exe PID 1416 wrote to memory of 1512 1416 RegAsm.exe vbc.exe PID 1416 wrote to memory of 1512 1416 RegAsm.exe vbc.exe PID 1416 wrote to memory of 1512 1416 RegAsm.exe vbc.exe PID 1416 wrote to memory of 1512 1416 RegAsm.exe vbc.exe PID 1416 wrote to memory of 1512 1416 RegAsm.exe vbc.exe PID 1416 wrote to memory of 948 1416 RegAsm.exe vbc.exe PID 1416 wrote to memory of 948 1416 RegAsm.exe vbc.exe PID 1416 wrote to memory of 948 1416 RegAsm.exe vbc.exe PID 1416 wrote to memory of 948 1416 RegAsm.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe"C:\Users\Admin\AppData\Local\Temp\12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\12608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
- Accesses Microsoft Outlook accounts
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe -f "C:\Users\Admin\AppData\Local\Temp\holdermail.txt"3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v "Load" /d "cmd /c C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe" /f4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows" /v "Load" /d "cmd /c C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exe" /f5⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe"5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\holdermail.txtFilesize
321B
MD5e62221a3bb549a72fcc4afa60d34e620
SHA1d60b16b540e0e3ed459a30cce0678d1fc8a1989a
SHA256587f8f51485b575f30e5e1608f70b31b9d8bb384318802373cc52cbdf2a4aa95
SHA5125b6f6a3a88961b62870e486b02e41d065b3f054f3ad45f7c7e01aff3ba151893e36fd3c13771ed9e3738aaa525296a8ee72adc05fb32932ec3af259404172aed
-
C:\Users\Admin\AppData\Local\Temp\holdermail.txtFilesize
321B
MD5c3609e29395ccd5fd8407fed36414e75
SHA104c0c5dc3fcced0c5581c44af17fa60260fb591a
SHA256a32df1c247d5738af4241edc4aa520dbb21013d05d47cac5db96ccfb48de7857
SHA5128bbd7b458f2be6e91c46cad8f682e109c7a7317f9ae89e5ce889ae7d4db5775b83d03016f47b56aa75bd5646a50c06ae7adbf2fc8af6b9f8a976f2ce30de3533
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exeFilesize
1.0MB
MD503a6f05f998a2c1da3bbe3dba6f44917
SHA1b9a38f68387f77ed9b752f056bda282580a52ca8
SHA25612608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b
SHA512d45f3792eba2e04b5f1c9686ee7711f6a2edc976e4f770f34cdff86bb537aeb247d1fe0b705c5cea8860cf32245794b95f2a156597136a168e5c1a953ef929f9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exeFilesize
1.0MB
MD503a6f05f998a2c1da3bbe3dba6f44917
SHA1b9a38f68387f77ed9b752f056bda282580a52ca8
SHA25612608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b
SHA512d45f3792eba2e04b5f1c9686ee7711f6a2edc976e4f770f34cdff86bb537aeb247d1fe0b705c5cea8860cf32245794b95f2a156597136a168e5c1a953ef929f9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exeFilesize
24KB
MD517f51ab722963d73b5dcd050d06e6d40
SHA170a1eb538fe961512c74dda727ef185c8eb42884
SHA256e1b1dc86ebe7440828efab389cb9edcfd639463a8ff64742818a84859a7ff417
SHA512041794fb9817e578e3aa00f019ce295b82dc6ee5dd23b49e79785570d3f60c058f6292b1382ff3b0e9999774cb60bc5a76919b4fd79d2bba85ea594d9719ac0d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exeFilesize
24KB
MD517f51ab722963d73b5dcd050d06e6d40
SHA170a1eb538fe961512c74dda727ef185c8eb42884
SHA256e1b1dc86ebe7440828efab389cb9edcfd639463a8ff64742818a84859a7ff417
SHA512041794fb9817e578e3aa00f019ce295b82dc6ee5dd23b49e79785570d3f60c058f6292b1382ff3b0e9999774cb60bc5a76919b4fd79d2bba85ea594d9719ac0d
-
C:\Users\Admin\AppData\Roaming\pid.txtFilesize
4B
MD523ad3e314e2a2b43b4c720507cec0723
SHA17197aab2aa1010716c7ac34668ce1efa0a6647ce
SHA256c775788b4db45b59989df2c70fdbf7895f0de12023618a38f5c0a417b7f3699e
SHA512b6dfd12ffc11e847a6e439a3d5f436b06bd257f5de478241fe357e4fa16c3dbfbcdf0cc1d35bf747cb529da3e2daeb9a0013b336fbe1eb2c1b97f42d53a99557
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\dnsmon.exeFilesize
1.0MB
MD503a6f05f998a2c1da3bbe3dba6f44917
SHA1b9a38f68387f77ed9b752f056bda282580a52ca8
SHA25612608321b3a1385f9c0650e1208090b9318c65a52bc4a60f4b3419b622f40b2b
SHA512d45f3792eba2e04b5f1c9686ee7711f6a2edc976e4f770f34cdff86bb537aeb247d1fe0b705c5cea8860cf32245794b95f2a156597136a168e5c1a953ef929f9
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\natsv.exeFilesize
24KB
MD517f51ab722963d73b5dcd050d06e6d40
SHA170a1eb538fe961512c74dda727ef185c8eb42884
SHA256e1b1dc86ebe7440828efab389cb9edcfd639463a8ff64742818a84859a7ff417
SHA512041794fb9817e578e3aa00f019ce295b82dc6ee5dd23b49e79785570d3f60c058f6292b1382ff3b0e9999774cb60bc5a76919b4fd79d2bba85ea594d9719ac0d
-
memory/324-69-0x0000000000000000-mapping.dmp
-
memory/948-125-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/948-123-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/948-119-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/948-120-0x0000000000442C62-mapping.dmp
-
memory/952-77-0x0000000000000000-mapping.dmp
-
memory/1072-105-0x00000000008A6000-0x00000000008B7000-memory.dmpFilesize
68KB
-
memory/1072-92-0x00000000004E1E9E-mapping.dmp
-
memory/1072-109-0x0000000074B30000-0x00000000750DB000-memory.dmpFilesize
5.7MB
-
memory/1072-104-0x0000000074B30000-0x00000000750DB000-memory.dmpFilesize
5.7MB
-
memory/1072-101-0x0000000000090000-0x0000000000176000-memory.dmpFilesize
920KB
-
memory/1072-98-0x0000000000090000-0x0000000000176000-memory.dmpFilesize
920KB
-
memory/1072-94-0x0000000000090000-0x0000000000176000-memory.dmpFilesize
920KB
-
memory/1180-76-0x0000000000000000-mapping.dmp
-
memory/1416-115-0x0000000000886000-0x0000000000897000-memory.dmpFilesize
68KB
-
memory/1416-107-0x0000000074B30000-0x00000000750DB000-memory.dmpFilesize
5.7MB
-
memory/1416-64-0x00000000004E1E9E-mapping.dmp
-
memory/1416-59-0x0000000000400000-0x00000000004E6000-memory.dmpFilesize
920KB
-
memory/1416-61-0x0000000000400000-0x00000000004E6000-memory.dmpFilesize
920KB
-
memory/1416-63-0x0000000000400000-0x00000000004E6000-memory.dmpFilesize
920KB
-
memory/1416-79-0x0000000074B30000-0x00000000750DB000-memory.dmpFilesize
5.7MB
-
memory/1416-58-0x0000000000400000-0x00000000004E6000-memory.dmpFilesize
920KB
-
memory/1416-126-0x0000000000886000-0x0000000000897000-memory.dmpFilesize
68KB
-
memory/1416-62-0x0000000000400000-0x00000000004E6000-memory.dmpFilesize
920KB
-
memory/1416-66-0x0000000000400000-0x00000000004E6000-memory.dmpFilesize
920KB
-
memory/1416-68-0x0000000000400000-0x00000000004E6000-memory.dmpFilesize
920KB
-
memory/1488-54-0x0000000075AD1000-0x0000000075AD3000-memory.dmpFilesize
8KB
-
memory/1488-55-0x0000000074B30000-0x00000000750DB000-memory.dmpFilesize
5.7MB
-
memory/1488-56-0x0000000074B30000-0x00000000750DB000-memory.dmpFilesize
5.7MB
-
memory/1512-111-0x0000000000442FBF-mapping.dmp
-
memory/1512-110-0x0000000000400000-0x000000000046E000-memory.dmpFilesize
440KB
-
memory/1512-114-0x0000000000400000-0x000000000046E000-memory.dmpFilesize
440KB
-
memory/1512-116-0x0000000000400000-0x000000000046E000-memory.dmpFilesize
440KB
-
memory/1512-118-0x0000000000400000-0x000000000046E000-memory.dmpFilesize
440KB
-
memory/1612-108-0x0000000074B30000-0x00000000750DB000-memory.dmpFilesize
5.7MB
-
memory/1612-82-0x0000000000000000-mapping.dmp
-
memory/1612-85-0x0000000074B30000-0x00000000750DB000-memory.dmpFilesize
5.7MB
-
memory/1624-57-0x0000000000000000-mapping.dmp
-
memory/1700-72-0x0000000000000000-mapping.dmp
-
memory/1700-106-0x0000000074B30000-0x00000000750DB000-memory.dmpFilesize
5.7MB
-
memory/1700-78-0x0000000074B30000-0x00000000750DB000-memory.dmpFilesize
5.7MB