Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
24-11-2022 19:25
Static task
static1
Behavioral task
behavioral1
Sample
519a4655f121a0d225c90544bb38a01efdaf51e00dc3b42ed88254169de50c2a.exe
Resource
win10-20220901-en
General
-
Target
519a4655f121a0d225c90544bb38a01efdaf51e00dc3b42ed88254169de50c2a.exe
-
Size
187KB
-
MD5
5ebe8380dfc5f8943ccaf7b213325f35
-
SHA1
7928df89a5e15b177330d02d2d814b91ab6ab155
-
SHA256
519a4655f121a0d225c90544bb38a01efdaf51e00dc3b42ed88254169de50c2a
-
SHA512
9f03e856d3fdf1e32a454038363cadb2d6128ec6b0fe2a9f81f442121518a03e0a7ad0509e506803095bc7efa965e780c9b49ec15a14c3cf84df3f6dc731a663
-
SSDEEP
3072:Ws2znCyxCcOzWwLR347Uol5zvgB0hzblsVYfiOm7IBu:wzKhLR3HUvg2zblsVY3m78u
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 22 3564 rundll32.exe 28 3564 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
318F.exepid process 3448 318F.exe -
Deletes itself 1 IoCs
Processes:
pid process 2588 -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3564 rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rundll32.exedescription pid process target process PID 3564 set thread context of 4204 3564 rundll32.exe rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
519a4655f121a0d225c90544bb38a01efdaf51e00dc3b42ed88254169de50c2a.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 519a4655f121a0d225c90544bb38a01efdaf51e00dc3b42ed88254169de50c2a.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 519a4655f121a0d225c90544bb38a01efdaf51e00dc3b42ed88254169de50c2a.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 519a4655f121a0d225c90544bb38a01efdaf51e00dc3b42ed88254169de50c2a.exe -
Checks processor information in registry 2 TTPs 18 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe -
Processes:
description ioc process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Toolbar Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 -
Modifies registry class 36 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 820074001c0043465346160031000000000000000000100041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f400009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004100700070004400610074006100000042000000 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\WorkFolders Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4e0031000000000078554b9b100054656d7000003a0009000400efbe2155a88478554b9b2e00000000000000000000000000000000000000000000000000fcf81800540065006d007000000014000000 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 50003100000000000000000010004c6f63616c003c0009000400efbe00000000000000002e00000000000000000000000000000000000000000000000000000000004c006f00630061006c00000014000000 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 Set value (data) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
pid process 2588 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
519a4655f121a0d225c90544bb38a01efdaf51e00dc3b42ed88254169de50c2a.exepid process 2764 519a4655f121a0d225c90544bb38a01efdaf51e00dc3b42ed88254169de50c2a.exe 2764 519a4655f121a0d225c90544bb38a01efdaf51e00dc3b42ed88254169de50c2a.exe 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 2588 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2588 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
519a4655f121a0d225c90544bb38a01efdaf51e00dc3b42ed88254169de50c2a.exepid process 2764 519a4655f121a0d225c90544bb38a01efdaf51e00dc3b42ed88254169de50c2a.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 Token: SeShutdownPrivilege 2588 Token: SeCreatePagefilePrivilege 2588 -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
rundll32.exepid process 4204 rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
pid process 2588 2588 -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
318F.exerundll32.exedescription pid process target process PID 2588 wrote to memory of 3448 2588 318F.exe PID 2588 wrote to memory of 3448 2588 318F.exe PID 2588 wrote to memory of 3448 2588 318F.exe PID 3448 wrote to memory of 3564 3448 318F.exe rundll32.exe PID 3448 wrote to memory of 3564 3448 318F.exe rundll32.exe PID 3448 wrote to memory of 3564 3448 318F.exe rundll32.exe PID 3564 wrote to memory of 4204 3564 rundll32.exe rundll32.exe PID 3564 wrote to memory of 4204 3564 rundll32.exe rundll32.exe PID 3564 wrote to memory of 4204 3564 rundll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\519a4655f121a0d225c90544bb38a01efdaf51e00dc3b42ed88254169de50c2a.exe"C:\Users\Admin\AppData\Local\Temp\519a4655f121a0d225c90544bb38a01efdaf51e00dc3b42ed88254169de50c2a.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\318F.exeC:\Users\Admin\AppData\Local\Temp\318F.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Users\Admin\AppData\Local\Temp\Tdryuqayh.tmp",Worhdhqfpryr2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 201493⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\318F.exeFilesize
1017KB
MD51bd9fb4ade498938e6432d6c5d1e23a5
SHA1909ecec41f837a402ee4ef43d8b9f6b06a5a8aaf
SHA25612b8b5bfde4092b4248accc682098222420ee6a0b6dfe89eb268f7fcf8cf00fb
SHA512ea02ab5ec0bdeaba4e897e5e1e50ccf27ab392ac859348cdf1caaaf90c7c10f1e99cdd01317f36479cb600b9fe2189f34b59afc822071ec4c7ea989f8f99cda5
-
C:\Users\Admin\AppData\Local\Temp\318F.exeFilesize
1017KB
MD51bd9fb4ade498938e6432d6c5d1e23a5
SHA1909ecec41f837a402ee4ef43d8b9f6b06a5a8aaf
SHA25612b8b5bfde4092b4248accc682098222420ee6a0b6dfe89eb268f7fcf8cf00fb
SHA512ea02ab5ec0bdeaba4e897e5e1e50ccf27ab392ac859348cdf1caaaf90c7c10f1e99cdd01317f36479cb600b9fe2189f34b59afc822071ec4c7ea989f8f99cda5
-
C:\Users\Admin\AppData\Local\Temp\Tdryuqayh.tmpFilesize
767KB
MD5d8ca174a8f3f0c225429e1be1cb6d304
SHA10f2e738b1a35b6072e1d23894468e45fa7dee750
SHA2563d63ad175a34e4c89ea6eca4a1161bb5dd514a5e58302707edc03473eb1f656e
SHA512dbf999a9f0399b3cbf93484f2e665e3beb4de369dacf4678c7b7b3ff06f45c42879c544c2404d85b88fe3aaacf117a1e28ecb68ee7ea2553b736bad03619e527
-
\Users\Admin\AppData\Local\Temp\Tdryuqayh.tmpFilesize
767KB
MD5d8ca174a8f3f0c225429e1be1cb6d304
SHA10f2e738b1a35b6072e1d23894468e45fa7dee750
SHA2563d63ad175a34e4c89ea6eca4a1161bb5dd514a5e58302707edc03473eb1f656e
SHA512dbf999a9f0399b3cbf93484f2e665e3beb4de369dacf4678c7b7b3ff06f45c42879c544c2404d85b88fe3aaacf117a1e28ecb68ee7ea2553b736bad03619e527
-
memory/2764-117-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-119-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-118-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-120-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-121-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-122-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-123-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-124-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-125-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-127-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-126-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-128-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-129-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-130-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-131-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-132-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-133-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-134-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-135-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-136-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-137-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-138-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-139-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-140-0x000000000096A000-0x000000000097A000-memory.dmpFilesize
64KB
-
memory/2764-141-0x0000000000780000-0x00000000008CA000-memory.dmpFilesize
1.3MB
-
memory/2764-142-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-143-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-144-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-145-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-146-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-147-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-148-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-149-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-150-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-151-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/2764-152-0x0000000000400000-0x000000000064C000-memory.dmpFilesize
2.3MB
-
memory/2764-153-0x000000000096A000-0x000000000097A000-memory.dmpFilesize
64KB
-
memory/2764-154-0x0000000000400000-0x000000000064C000-memory.dmpFilesize
2.3MB
-
memory/3448-155-0x0000000000000000-mapping.dmp
-
memory/3448-179-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-158-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-159-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-160-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-161-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-162-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-163-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-165-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-166-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-167-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-168-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-169-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-170-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-171-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-172-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-173-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-174-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-175-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-176-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-177-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-157-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-178-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-181-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-182-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-183-0x00000000022F0000-0x00000000023DE000-memory.dmpFilesize
952KB
-
memory/3448-185-0x00000000024E0000-0x0000000002600000-memory.dmpFilesize
1.1MB
-
memory/3448-184-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-186-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-187-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-188-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-189-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-191-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-190-0x0000000077450000-0x00000000775DE000-memory.dmpFilesize
1.6MB
-
memory/3448-202-0x0000000000400000-0x000000000071B000-memory.dmpFilesize
3.1MB
-
memory/3448-211-0x0000000000400000-0x000000000071B000-memory.dmpFilesize
3.1MB
-
memory/3564-203-0x0000000000000000-mapping.dmp
-
memory/3564-303-0x0000000006890000-0x0000000007409000-memory.dmpFilesize
11.5MB
-
memory/3564-318-0x0000000007709000-0x000000000770B000-memory.dmpFilesize
8KB
-
memory/3564-321-0x0000000006890000-0x0000000007409000-memory.dmpFilesize
11.5MB
-
memory/4204-313-0x00007FF65F5C5FD0-mapping.dmp
-
memory/4204-319-0x0000000000920000-0x0000000000BCB000-memory.dmpFilesize
2.7MB
-
memory/4204-320-0x000001EF78BB0000-0x000001EF78E6C000-memory.dmpFilesize
2.7MB