Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 14:00
Static task
static1
General
-
Target
6f468cb81b5f735b1b1f007960c4bd87047ed84cbd0aae5cf1d44befb367f6d3.exe
-
Size
194KB
-
MD5
e966693dd5e4a21d86078d6f4299a564
-
SHA1
31e6d5c7b9a1d4d178c219d078c70241449d8b9a
-
SHA256
6f468cb81b5f735b1b1f007960c4bd87047ed84cbd0aae5cf1d44befb367f6d3
-
SHA512
9ac0f8a6092aade07ed68e267910f9f637c13dddde8b080ca8f0cd344e14b0f0c49ea39cd66a4c0f19c43828c0b5700348054ee6139c639d21590012e2c8de6d
-
SSDEEP
3072:3XO53oLPT8sP5lHI3w4f5C1QxkQRC62J7Fpma0KRBiSfK:nW3oLrjDOC1QrRC62Z0IBx
Malware Config
Extracted
danabot
192.236.233.188:443
192.119.70.159:443
23.106.124.171:443
213.227.155.103:443
-
embedded_hash
56951C922035D696BFCE443750496462
-
type
loader
Extracted
systembc
45.182.189.231:443
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4892-133-0x0000000000550000-0x0000000000559000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 77 3580 rundll32.exe 78 3580 rundll32.exe 80 3580 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
1A8D.exe57B6.exegcebh.exepid process 3656 1A8D.exe 4272 57B6.exe 4436 gcebh.exe -
Drops file in Windows directory 2 IoCs
Processes:
57B6.exedescription ioc process File created C:\Windows\Tasks\gcebh.job 57B6.exe File opened for modification C:\Windows\Tasks\gcebh.job 57B6.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2072 3656 WerFault.exe 1A8D.exe 4448 4272 WerFault.exe 57B6.exe -
Checks SCSI registry key(s) 3 TTPs 39 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
svchost.exe6f468cb81b5f735b1b1f007960c4bd87047ed84cbd0aae5cf1d44befb367f6d3.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6f468cb81b5f735b1b1f007960c4bd87047ed84cbd0aae5cf1d44befb367f6d3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName svchost.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6f468cb81b5f735b1b1f007960c4bd87047ed84cbd0aae5cf1d44befb367f6d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6f468cb81b5f735b1b1f007960c4bd87047ed84cbd0aae5cf1d44befb367f6d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
6f468cb81b5f735b1b1f007960c4bd87047ed84cbd0aae5cf1d44befb367f6d3.exepid process 4892 6f468cb81b5f735b1b1f007960c4bd87047ed84cbd0aae5cf1d44befb367f6d3.exe 4892 6f468cb81b5f735b1b1f007960c4bd87047ed84cbd0aae5cf1d44befb367f6d3.exe 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 2664 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2664 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
6f468cb81b5f735b1b1f007960c4bd87047ed84cbd0aae5cf1d44befb367f6d3.exepid process 4892 6f468cb81b5f735b1b1f007960c4bd87047ed84cbd0aae5cf1d44befb367f6d3.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
svchost.exedescription pid process Token: SeShutdownPrivilege 1528 svchost.exe Token: SeShutdownPrivilege 1528 svchost.exe Token: SeCreatePagefilePrivilege 1528 svchost.exe Token: SeShutdownPrivilege 2664 Token: SeCreatePagefilePrivilege 2664 Token: SeShutdownPrivilege 2664 Token: SeCreatePagefilePrivilege 2664 Token: SeShutdownPrivilege 2664 Token: SeCreatePagefilePrivilege 2664 Token: SeShutdownPrivilege 2664 Token: SeCreatePagefilePrivilege 2664 -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
1A8D.exedescription pid process target process PID 2664 wrote to memory of 3656 2664 1A8D.exe PID 2664 wrote to memory of 3656 2664 1A8D.exe PID 2664 wrote to memory of 3656 2664 1A8D.exe PID 3656 wrote to memory of 3208 3656 1A8D.exe agentactivationruntimestarter.exe PID 3656 wrote to memory of 3208 3656 1A8D.exe agentactivationruntimestarter.exe PID 3656 wrote to memory of 3208 3656 1A8D.exe agentactivationruntimestarter.exe PID 2664 wrote to memory of 4272 2664 57B6.exe PID 2664 wrote to memory of 4272 2664 57B6.exe PID 2664 wrote to memory of 4272 2664 57B6.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe PID 3656 wrote to memory of 3580 3656 1A8D.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f468cb81b5f735b1b1f007960c4bd87047ed84cbd0aae5cf1d44befb367f6d3.exe"C:\Users\Admin\AppData\Local\Temp\6f468cb81b5f735b1b1f007960c4bd87047ed84cbd0aae5cf1d44befb367f6d3.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\1A8D.exeC:\Users\Admin\AppData\Local\Temp\1A8D.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\agentactivationruntimestarter.exeC:\Windows\system32\agentactivationruntimestarter.exe2⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\syswow64\rundll32.exe" "C:\Windows\syswow64\shell32.dll",#612⤵
- Blocklisted process makes network request
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 6202⤵
- Program crash
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k AarSvcGroup -p -s AarSvc1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x50c 0x4801⤵
-
C:\Users\Admin\AppData\Local\Temp\57B6.exeC:\Users\Admin\AppData\Local\Temp\57B6.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 9642⤵
- Program crash
-
C:\ProgramData\anclvm\gcebh.exeC:\ProgramData\anclvm\gcebh.exe start1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3656 -ip 36561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4272 -ip 42721⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\anclvm\gcebh.exeFilesize
232KB
MD5e6a2badbaf300ed3d7d42b3fa6a9a157
SHA1d174034dea1938aba93f32ffef96fb45cded1ffc
SHA256494cb119d92bb66f744adb1cb37c8671060e9804ec15c0f75729e81f6f747f8d
SHA51232e6a9e24ae967871ec18519d918b8f27b586b759d3a436450f7ce87928d35393a0208d42318d565ea56ac746c837ac8da833744d7260402102f3ad91cab92a2
-
C:\ProgramData\anclvm\gcebh.exeFilesize
232KB
MD5e6a2badbaf300ed3d7d42b3fa6a9a157
SHA1d174034dea1938aba93f32ffef96fb45cded1ffc
SHA256494cb119d92bb66f744adb1cb37c8671060e9804ec15c0f75729e81f6f747f8d
SHA51232e6a9e24ae967871ec18519d918b8f27b586b759d3a436450f7ce87928d35393a0208d42318d565ea56ac746c837ac8da833744d7260402102f3ad91cab92a2
-
C:\Users\Admin\AppData\Local\Temp\1A8D.exeFilesize
1.2MB
MD59722bbb364e91ab86e5900a6b0f444d6
SHA190202341716d3ae7faf75bd34e023b2b3be735af
SHA256f70ac92e5145f1009575eb0e6c77b505610eb2ab03ff3ff6a59dc6447add7b75
SHA51280c55ccb16bf8bad55e213fb141eb2394f6036083300c6e59506ef4dadda2f255c818b9d015fefdebd4fa66a1b75aff3c6326b47daf1134f4f2d2d7fb136f2d2
-
C:\Users\Admin\AppData\Local\Temp\1A8D.exeFilesize
1.2MB
MD59722bbb364e91ab86e5900a6b0f444d6
SHA190202341716d3ae7faf75bd34e023b2b3be735af
SHA256f70ac92e5145f1009575eb0e6c77b505610eb2ab03ff3ff6a59dc6447add7b75
SHA51280c55ccb16bf8bad55e213fb141eb2394f6036083300c6e59506ef4dadda2f255c818b9d015fefdebd4fa66a1b75aff3c6326b47daf1134f4f2d2d7fb136f2d2
-
C:\Users\Admin\AppData\Local\Temp\57B6.exeFilesize
232KB
MD5e6a2badbaf300ed3d7d42b3fa6a9a157
SHA1d174034dea1938aba93f32ffef96fb45cded1ffc
SHA256494cb119d92bb66f744adb1cb37c8671060e9804ec15c0f75729e81f6f747f8d
SHA51232e6a9e24ae967871ec18519d918b8f27b586b759d3a436450f7ce87928d35393a0208d42318d565ea56ac746c837ac8da833744d7260402102f3ad91cab92a2
-
C:\Users\Admin\AppData\Local\Temp\57B6.exeFilesize
232KB
MD5e6a2badbaf300ed3d7d42b3fa6a9a157
SHA1d174034dea1938aba93f32ffef96fb45cded1ffc
SHA256494cb119d92bb66f744adb1cb37c8671060e9804ec15c0f75729e81f6f747f8d
SHA51232e6a9e24ae967871ec18519d918b8f27b586b759d3a436450f7ce87928d35393a0208d42318d565ea56ac746c837ac8da833744d7260402102f3ad91cab92a2
-
memory/3208-139-0x0000000000000000-mapping.dmp
-
memory/3580-166-0x0000000000F20000-0x0000000000F23000-memory.dmpFilesize
12KB
-
memory/3580-164-0x0000000000F00000-0x0000000000F03000-memory.dmpFilesize
12KB
-
memory/3580-169-0x0000000000F50000-0x0000000000F53000-memory.dmpFilesize
12KB
-
memory/3580-168-0x0000000000F40000-0x0000000000F43000-memory.dmpFilesize
12KB
-
memory/3580-167-0x0000000000F30000-0x0000000000F33000-memory.dmpFilesize
12KB
-
memory/3580-157-0x0000000000000000-mapping.dmp
-
memory/3580-171-0x0000000000F70000-0x0000000000F73000-memory.dmpFilesize
12KB
-
memory/3580-172-0x0000000000F80000-0x0000000000F83000-memory.dmpFilesize
12KB
-
memory/3580-165-0x0000000000F10000-0x0000000000F13000-memory.dmpFilesize
12KB
-
memory/3580-170-0x0000000000F60000-0x0000000000F63000-memory.dmpFilesize
12KB
-
memory/3580-163-0x0000000000EF0000-0x0000000000EF3000-memory.dmpFilesize
12KB
-
memory/3580-162-0x0000000000EE0000-0x0000000000EE3000-memory.dmpFilesize
12KB
-
memory/3580-173-0x0000000000F90000-0x0000000000F93000-memory.dmpFilesize
12KB
-
memory/3580-174-0x0000000000FA0000-0x0000000000FA3000-memory.dmpFilesize
12KB
-
memory/3580-161-0x0000000000ED0000-0x0000000000ED3000-memory.dmpFilesize
12KB
-
memory/3580-160-0x0000000000EC0000-0x0000000000EC3000-memory.dmpFilesize
12KB
-
memory/3580-159-0x0000000000EB0000-0x0000000000EB3000-memory.dmpFilesize
12KB
-
memory/3580-158-0x0000000000EA0000-0x0000000000EA3000-memory.dmpFilesize
12KB
-
memory/3656-143-0x0000000000400000-0x00000000006CE000-memory.dmpFilesize
2.8MB
-
memory/3656-142-0x0000000000400000-0x00000000006CE000-memory.dmpFilesize
2.8MB
-
memory/3656-155-0x0000000000400000-0x00000000006CE000-memory.dmpFilesize
2.8MB
-
memory/3656-175-0x0000000000400000-0x00000000006CE000-memory.dmpFilesize
2.8MB
-
memory/3656-136-0x0000000000000000-mapping.dmp
-
memory/3656-140-0x0000000002370000-0x000000000248E000-memory.dmpFilesize
1.1MB
-
memory/3656-156-0x0000000000400000-0x00000000006CE000-memory.dmpFilesize
2.8MB
-
memory/3656-141-0x0000000002590000-0x0000000002852000-memory.dmpFilesize
2.8MB
-
memory/4272-149-0x0000000000400000-0x000000000049C000-memory.dmpFilesize
624KB
-
memory/4272-144-0x0000000000000000-mapping.dmp
-
memory/4272-147-0x00000000006BE000-0x00000000006CF000-memory.dmpFilesize
68KB
-
memory/4272-148-0x0000000000A80000-0x0000000000A89000-memory.dmpFilesize
36KB
-
memory/4272-150-0x00000000006BE000-0x00000000006CF000-memory.dmpFilesize
68KB
-
memory/4272-176-0x00000000006BE000-0x00000000006CF000-memory.dmpFilesize
68KB
-
memory/4272-177-0x0000000000400000-0x000000000049C000-memory.dmpFilesize
624KB
-
memory/4436-153-0x00000000007CA000-0x00000000007DA000-memory.dmpFilesize
64KB
-
memory/4436-154-0x0000000000400000-0x000000000049C000-memory.dmpFilesize
624KB
-
memory/4892-132-0x0000000000578000-0x0000000000588000-memory.dmpFilesize
64KB
-
memory/4892-135-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/4892-134-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/4892-133-0x0000000000550000-0x0000000000559000-memory.dmpFilesize
36KB