Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 19:53
Static task
static1
Behavioral task
behavioral1
Sample
18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe
Resource
win10v2004-20220812-en
General
-
Target
18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe
-
Size
817KB
-
MD5
d73b8c3a4405846fd0ba8c384a7113a1
-
SHA1
0751fb4a0ac6671c71d7b48caf605e77b1424c3d
-
SHA256
18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214
-
SHA512
239e0578ff629073b26a76bc46e427c1dce63f811d7baab50af73fcda91ed9b70191b056bdaf3fc2999485218a8e9bc7071956d2b5d634004e0cb8120321b727
-
SSDEEP
24576:HRmJkcoQricOIQxiZY1iaBcien5VcrEjFk6d:sJZoQrbTFZY1iaBcBXc0P
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\winmgr89.exe,explorer.exe" 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe -
NetWire RAT payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1956-66-0x0000000000400000-0x0000000000417000-memory.dmp netwire behavioral1/memory/1956-68-0x0000000000400000-0x0000000000417000-memory.dmp netwire -
Executes dropped EXE 2 IoCs
Processes:
winmgr89.exewinmgr89.exepid process 860 winmgr89.exe 1908 winmgr89.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\NetWire = "C:\\Windows\\SysWOW64\\svchost.exe" svchost.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Windows\winmgr89.exe autoit_exe C:\Users\Admin\AppData\Roaming\Windows\winmgr89.exe autoit_exe C:\Users\Admin\AppData\Roaming\Windows\winmgr89.exe autoit_exe -
Drops file in System32 directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\SysWOW64\.Identifier svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exedescription pid process target process PID 1612 set thread context of 1956 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 12 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1972 schtasks.exe 984 schtasks.exe 2044 schtasks.exe 1604 schtasks.exe 1616 schtasks.exe 1980 schtasks.exe 1504 schtasks.exe 560 schtasks.exe 524 schtasks.exe 1204 schtasks.exe 1644 schtasks.exe 736 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exepid process 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exetaskeng.exedescription pid process target process PID 1612 wrote to memory of 1956 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe svchost.exe PID 1612 wrote to memory of 1956 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe svchost.exe PID 1612 wrote to memory of 1956 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe svchost.exe PID 1612 wrote to memory of 1956 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe svchost.exe PID 1612 wrote to memory of 1956 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe svchost.exe PID 1612 wrote to memory of 1956 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe svchost.exe PID 1612 wrote to memory of 1956 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe svchost.exe PID 1612 wrote to memory of 1956 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe svchost.exe PID 1612 wrote to memory of 1956 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe svchost.exe PID 1612 wrote to memory of 984 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 984 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 984 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 984 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1204 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1204 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1204 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1204 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1056 wrote to memory of 860 1056 taskeng.exe winmgr89.exe PID 1056 wrote to memory of 860 1056 taskeng.exe winmgr89.exe PID 1056 wrote to memory of 860 1056 taskeng.exe winmgr89.exe PID 1056 wrote to memory of 860 1056 taskeng.exe winmgr89.exe PID 1612 wrote to memory of 2044 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 2044 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 2044 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 2044 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1644 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1644 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1644 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1644 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1604 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1604 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1604 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1604 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1616 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1616 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1616 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1616 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1980 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1980 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1980 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1980 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1972 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1972 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1972 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1972 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1056 wrote to memory of 1908 1056 taskeng.exe winmgr89.exe PID 1056 wrote to memory of 1908 1056 taskeng.exe winmgr89.exe PID 1056 wrote to memory of 1908 1056 taskeng.exe winmgr89.exe PID 1056 wrote to memory of 1908 1056 taskeng.exe winmgr89.exe PID 1612 wrote to memory of 1504 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1504 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1504 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 1504 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 560 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 560 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 560 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 560 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 524 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 524 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 524 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 524 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 736 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 736 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe PID 1612 wrote to memory of 736 1612 18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe"C:\Users\Admin\AppData\Local\Temp\18df3cc6f2fc32277040460c85aaf927848e63abb3d005b43fcb8d0368a57214.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\System32\svchost.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr89.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr89.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr89.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr89.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr89.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr89.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr89.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr89.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr89.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr89.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr89.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr89.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr89.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr89.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr89.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr89.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr89.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr89.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr89.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr89.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr89.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr89.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exeC:\Windows\SysWOW64\schtasks.exe /create /sc minute /mo 1 /tn "winmgr89.exe" /tr "C:\Users\Admin\AppData\Roaming\Windows\winmgr89.exe" /f2⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {384E554D-C92D-4202-B0A2-60D2C39C1729} S-1-5-21-999675638-2867687379-27515722-1000:ORXGKKZC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Windows\winmgr89.exeC:\Users\Admin\AppData\Roaming\Windows\winmgr89.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\Windows\winmgr89.exeC:\Users\Admin\AppData\Roaming\Windows\winmgr89.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Windows\winmgr89.exeFilesize
1.6MB
MD535616d90e4da255743f5b3d0137de8d6
SHA14b2ff6ab9cd0c2758a354912821a87b3b058d0d7
SHA256adacbac9c9e0ead716041f5943fbb7bb206c9ec8f45222794e8255b16ac160ca
SHA5122f9bf19785e5fd7de8059521704c6e49c51e7dc17379c698e70702a94a5c1540c7e6b1abc15448f83af02c0c0960a36f16762e241d3754f083237ba0f7f39f6c
-
C:\Users\Admin\AppData\Roaming\Windows\winmgr89.exeFilesize
1.6MB
MD535616d90e4da255743f5b3d0137de8d6
SHA14b2ff6ab9cd0c2758a354912821a87b3b058d0d7
SHA256adacbac9c9e0ead716041f5943fbb7bb206c9ec8f45222794e8255b16ac160ca
SHA5122f9bf19785e5fd7de8059521704c6e49c51e7dc17379c698e70702a94a5c1540c7e6b1abc15448f83af02c0c0960a36f16762e241d3754f083237ba0f7f39f6c
-
C:\Users\Admin\AppData\Roaming\Windows\winmgr89.exeFilesize
1.6MB
MD535616d90e4da255743f5b3d0137de8d6
SHA14b2ff6ab9cd0c2758a354912821a87b3b058d0d7
SHA256adacbac9c9e0ead716041f5943fbb7bb206c9ec8f45222794e8255b16ac160ca
SHA5122f9bf19785e5fd7de8059521704c6e49c51e7dc17379c698e70702a94a5c1540c7e6b1abc15448f83af02c0c0960a36f16762e241d3754f083237ba0f7f39f6c
-
memory/524-85-0x0000000000000000-mapping.dmp
-
memory/560-84-0x0000000000000000-mapping.dmp
-
memory/736-86-0x0000000000000000-mapping.dmp
-
memory/860-71-0x0000000000000000-mapping.dmp
-
memory/984-67-0x0000000000000000-mapping.dmp
-
memory/1204-69-0x0000000000000000-mapping.dmp
-
memory/1504-83-0x0000000000000000-mapping.dmp
-
memory/1604-76-0x0000000000000000-mapping.dmp
-
memory/1612-54-0x0000000076681000-0x0000000076683000-memory.dmpFilesize
8KB
-
memory/1616-77-0x0000000000000000-mapping.dmp
-
memory/1644-75-0x0000000000000000-mapping.dmp
-
memory/1908-80-0x0000000000000000-mapping.dmp
-
memory/1956-66-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1956-65-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1956-62-0x0000000000401F8F-mapping.dmp
-
memory/1956-61-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1956-68-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1956-60-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1956-58-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1956-56-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1956-55-0x0000000000400000-0x0000000000417000-memory.dmpFilesize
92KB
-
memory/1972-79-0x0000000000000000-mapping.dmp
-
memory/1980-78-0x0000000000000000-mapping.dmp
-
memory/2044-74-0x0000000000000000-mapping.dmp