Analysis
-
max time kernel
517s -
max time network
444s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
06-12-2022 21:20
Static task
static1
Behavioral task
behavioral1
Sample
aggah.ps1
Resource
win10-20220901-en
Behavioral task
behavioral2
Sample
aggah.ps1
Resource
win7-20221111-en
General
-
Target
aggah.ps1
-
Size
1.1MB
-
MD5
8763a2445fde1b8c315ac06e4123207a
-
SHA1
84e8a98f70acce9988adf826ca0c52aaf66b21c2
-
SHA256
fa8f6002a8d571256dc88960a69ab44c7cbf65227c45e5b4750007d5749bbd44
-
SHA512
57b8fa11f322fd4f39608fa511b21c4560c9812743dfe57f49297995aad57b2945c0d370e12aa343cb84374126eb3bb51a20555db564255963512a19793cde4f
-
SSDEEP
12288:Cjx24c7RmYLQoSlhO5vLIyEDlzvOLHCKzR6VpPXncijT9L:CeRm6QoSlhOXqrOLHCn4ijTN
Malware Config
Extracted
Protocol: ftp- Host:
195.178.120.64 - Port:
21 - Username:
ashgdlkhfg3 - Password:
jfghfjg]45
Signatures
-
Registers COM server for autorun 1 TTPs 5 IoCs
Processes:
powershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" powershell.exe Key deleted \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 powershell.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" powershell.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
RegSvcs.exeRegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 26 api.ipify.org 15 api.ipify.org 16 api.ipify.org 25 api.ipify.org -
Suspicious use of SetThreadContext 6 IoCs
Processes:
powershell.exepowershell.exedescription pid process target process PID 4844 set thread context of 4716 4844 powershell.exe RegSvcs.exe PID 4844 set thread context of 4860 4844 powershell.exe RegSvcs.exe PID 4844 set thread context of 4780 4844 powershell.exe Msbuild.exe PID 2292 set thread context of 2632 2292 powershell.exe RegSvcs.exe PID 2292 set thread context of 2468 2292 powershell.exe RegSvcs.exe PID 2292 set thread context of 4004 2292 powershell.exe Msbuild.exe -
Modifies registry class 8 IoCs
Processes:
powershell.exepowershell.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" powershell.exe Key deleted \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 powershell.exe Key deleted \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} powershell.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} powershell.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32 powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec}\InProcServer32\ = "C:\\IDontExist.dll" powershell.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\CLSID\{fdb00e52-a214-4aa1-8fba-4357bb0072ec} powershell.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
Processes:
powershell.exepowershell.exedw20.exedw20.exeRegSvcs.exepowershell.exedw20.exedw20.exeRegSvcs.exepid process 4844 powershell.exe 4844 powershell.exe 4844 powershell.exe 4844 powershell.exe 4844 powershell.exe 4844 powershell.exe 4844 powershell.exe 4844 powershell.exe 3700 powershell.exe 3700 powershell.exe 3700 powershell.exe 2320 dw20.exe 2320 dw20.exe 2352 dw20.exe 2352 dw20.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 2292 powershell.exe 2292 powershell.exe 2292 powershell.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 4716 RegSvcs.exe 2292 powershell.exe 2292 powershell.exe 2292 powershell.exe 2292 powershell.exe 2292 powershell.exe 4456 dw20.exe 4456 dw20.exe 532 dw20.exe 532 dw20.exe 2632 RegSvcs.exe 2632 RegSvcs.exe 2632 RegSvcs.exe 2632 RegSvcs.exe 2632 RegSvcs.exe 2632 RegSvcs.exe 2632 RegSvcs.exe 2632 RegSvcs.exe 2632 RegSvcs.exe 2632 RegSvcs.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
RegSvcs.exepid process 4716 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
powershell.exepowershell.exeRegSvcs.exedw20.exepowershell.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 4844 powershell.exe Token: SeDebugPrivilege 3700 powershell.exe Token: SeDebugPrivilege 4716 RegSvcs.exe Token: SeRestorePrivilege 2352 dw20.exe Token: SeBackupPrivilege 2352 dw20.exe Token: SeDebugPrivilege 2292 powershell.exe Token: SeDebugPrivilege 2632 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
RegSvcs.exeRegSvcs.exepid process 4716 RegSvcs.exe 2632 RegSvcs.exe -
Suspicious use of WriteProcessMemory 61 IoCs
Processes:
cmd.exepowershell.exeRegSvcs.exeMsbuild.exepowershell.exeMsbuild.exedescription pid process target process PID 4276 wrote to memory of 3700 4276 cmd.exe powershell.exe PID 4276 wrote to memory of 3700 4276 cmd.exe powershell.exe PID 4844 wrote to memory of 4716 4844 powershell.exe RegSvcs.exe PID 4844 wrote to memory of 4716 4844 powershell.exe RegSvcs.exe PID 4844 wrote to memory of 4716 4844 powershell.exe RegSvcs.exe PID 4844 wrote to memory of 4716 4844 powershell.exe RegSvcs.exe PID 4844 wrote to memory of 4716 4844 powershell.exe RegSvcs.exe PID 4844 wrote to memory of 4716 4844 powershell.exe RegSvcs.exe PID 4844 wrote to memory of 4716 4844 powershell.exe RegSvcs.exe PID 4844 wrote to memory of 4716 4844 powershell.exe RegSvcs.exe PID 4844 wrote to memory of 4860 4844 powershell.exe RegSvcs.exe PID 4844 wrote to memory of 4860 4844 powershell.exe RegSvcs.exe PID 4844 wrote to memory of 4860 4844 powershell.exe RegSvcs.exe PID 4844 wrote to memory of 4860 4844 powershell.exe RegSvcs.exe PID 4844 wrote to memory of 4860 4844 powershell.exe RegSvcs.exe PID 4844 wrote to memory of 4860 4844 powershell.exe RegSvcs.exe PID 4844 wrote to memory of 4860 4844 powershell.exe RegSvcs.exe PID 4844 wrote to memory of 4860 4844 powershell.exe RegSvcs.exe PID 4844 wrote to memory of 4780 4844 powershell.exe Msbuild.exe PID 4844 wrote to memory of 4780 4844 powershell.exe Msbuild.exe PID 4844 wrote to memory of 4780 4844 powershell.exe Msbuild.exe PID 4844 wrote to memory of 4780 4844 powershell.exe Msbuild.exe PID 4844 wrote to memory of 4780 4844 powershell.exe Msbuild.exe PID 4844 wrote to memory of 4780 4844 powershell.exe Msbuild.exe PID 4844 wrote to memory of 4780 4844 powershell.exe Msbuild.exe PID 4844 wrote to memory of 4780 4844 powershell.exe Msbuild.exe PID 4860 wrote to memory of 2320 4860 RegSvcs.exe dw20.exe PID 4860 wrote to memory of 2320 4860 RegSvcs.exe dw20.exe PID 4860 wrote to memory of 2320 4860 RegSvcs.exe dw20.exe PID 4780 wrote to memory of 2352 4780 Msbuild.exe dw20.exe PID 4780 wrote to memory of 2352 4780 Msbuild.exe dw20.exe PID 4780 wrote to memory of 2352 4780 Msbuild.exe dw20.exe PID 4276 wrote to memory of 2292 4276 cmd.exe powershell.exe PID 4276 wrote to memory of 2292 4276 cmd.exe powershell.exe PID 2292 wrote to memory of 2632 2292 powershell.exe RegSvcs.exe PID 2292 wrote to memory of 2632 2292 powershell.exe RegSvcs.exe PID 2292 wrote to memory of 2632 2292 powershell.exe RegSvcs.exe PID 2292 wrote to memory of 2632 2292 powershell.exe RegSvcs.exe PID 2292 wrote to memory of 2632 2292 powershell.exe RegSvcs.exe PID 2292 wrote to memory of 2632 2292 powershell.exe RegSvcs.exe PID 2292 wrote to memory of 2632 2292 powershell.exe RegSvcs.exe PID 2292 wrote to memory of 2632 2292 powershell.exe RegSvcs.exe PID 2292 wrote to memory of 2468 2292 powershell.exe RegSvcs.exe PID 2292 wrote to memory of 2468 2292 powershell.exe RegSvcs.exe PID 2292 wrote to memory of 2468 2292 powershell.exe RegSvcs.exe PID 2292 wrote to memory of 2468 2292 powershell.exe RegSvcs.exe PID 2292 wrote to memory of 2468 2292 powershell.exe RegSvcs.exe PID 2292 wrote to memory of 2468 2292 powershell.exe RegSvcs.exe PID 2292 wrote to memory of 2468 2292 powershell.exe RegSvcs.exe PID 2292 wrote to memory of 2468 2292 powershell.exe RegSvcs.exe PID 2292 wrote to memory of 4004 2292 powershell.exe Msbuild.exe PID 2292 wrote to memory of 4004 2292 powershell.exe Msbuild.exe PID 2292 wrote to memory of 4004 2292 powershell.exe Msbuild.exe PID 2292 wrote to memory of 4004 2292 powershell.exe Msbuild.exe PID 2292 wrote to memory of 4004 2292 powershell.exe Msbuild.exe PID 2292 wrote to memory of 4004 2292 powershell.exe Msbuild.exe PID 2292 wrote to memory of 4004 2292 powershell.exe Msbuild.exe PID 2292 wrote to memory of 4004 2292 powershell.exe Msbuild.exe PID 4004 wrote to memory of 532 4004 Msbuild.exe dw20.exe PID 4004 wrote to memory of 532 4004 Msbuild.exe dw20.exe PID 4004 wrote to memory of 532 4004 Msbuild.exe dw20.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\aggah.ps11⤵
- Registers COM server for autorun
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7043⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7083⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -c aggah.ps12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -nop -ep unrestricted2⤵
- Registers COM server for autorun
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7044⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"C:\Windows\Microsoft.NET\Framework\v3.5\Msbuild.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7084⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5b49a31b6e3a6771dbfa29b309842ef4f
SHA16b837a896a3008be212e7a3e297859b06b1d22af
SHA256066845e6408685e957268c1c1bbb2240809c5b5751ae7973235490032eb51d81
SHA512804d493bfafbe4be906dc9bb760839af0dc1e7ff4e15cec1b75c328b982f797ee5910e045d691138bbf8e5bcaba3fcfe354523acd90be3a6180cdae14af19029
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD56247f3bc421823f887ec4f40862278be
SHA1994681f82f6b65dbfdb5b3120827373ececeb369
SHA25612869f1e095338dd2b70859964b3eb9f245907a47a0e86f787181ffe70a761a0
SHA5129033b9dd1a152aa8dd7277b64fbf8c73a65d0be7a72cc7c7c55f6218103e0af928d087663e95933a8167e1fb85546177f3270c11f0cd1314105c9a17aa14728a
-
memory/532-748-0x0000000000000000-mapping.dmp
-
memory/2292-564-0x0000000000000000-mapping.dmp
-
memory/2292-585-0x0000021B5FE40000-0x0000021B5FE7C000-memory.dmpFilesize
240KB
-
memory/2320-285-0x0000000000000000-mapping.dmp
-
memory/2352-286-0x0000000000000000-mapping.dmp
-
memory/2468-618-0x000000000048220E-mapping.dmp
-
memory/2632-858-0x0000000005860000-0x0000000005878000-memory.dmpFilesize
96KB
-
memory/2632-611-0x000000000048220E-mapping.dmp
-
memory/3700-138-0x0000000000000000-mapping.dmp
-
memory/4004-948-0x0000000073E00000-0x00000000743B0000-memory.dmpFilesize
5.7MB
-
memory/4004-629-0x000000000048220E-mapping.dmp
-
memory/4004-738-0x0000000073E00000-0x00000000743B0000-memory.dmpFilesize
5.7MB
-
memory/4004-959-0x0000000073E00000-0x00000000743B0000-memory.dmpFilesize
5.7MB
-
memory/4716-180-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4716-210-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4716-158-0x0000000000400000-0x0000000000488000-memory.dmpFilesize
544KB
-
memory/4716-178-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4716-159-0x000000000048220E-mapping.dmp
-
memory/4716-184-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4716-187-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4716-160-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4716-190-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4716-193-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4716-163-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4716-168-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4716-563-0x0000000006A70000-0x0000000006A7A000-memory.dmpFilesize
40KB
-
memory/4716-200-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4716-543-0x00000000065E0000-0x0000000006630000-memory.dmpFilesize
320KB
-
memory/4716-206-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4716-460-0x0000000005290000-0x00000000052A8000-memory.dmpFilesize
96KB
-
memory/4716-433-0x00000000052C0000-0x0000000005352000-memory.dmpFilesize
584KB
-
memory/4716-214-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4716-217-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4716-435-0x0000000005220000-0x0000000005286000-memory.dmpFilesize
408KB
-
memory/4716-170-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4716-284-0x0000000004FC0000-0x000000000505C000-memory.dmpFilesize
624KB
-
memory/4716-295-0x0000000005580000-0x0000000005A7E000-memory.dmpFilesize
5.0MB
-
memory/4716-165-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4716-219-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4716-276-0x0000000000B00000-0x0000000000B88000-memory.dmpFilesize
544KB
-
memory/4716-196-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4716-203-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4716-172-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4780-175-0x000000000048220E-mapping.dmp
-
memory/4780-216-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4780-224-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4780-222-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4780-218-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4780-213-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4780-181-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4780-205-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4780-188-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4780-202-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4780-199-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4780-195-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4780-198-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4780-177-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4780-553-0x0000000073E00000-0x00000000743B0000-memory.dmpFilesize
5.7MB
-
memory/4780-192-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4780-540-0x0000000073E00000-0x00000000743B0000-memory.dmpFilesize
5.7MB
-
memory/4780-186-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4780-220-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4780-278-0x0000000073E00000-0x00000000743B0000-memory.dmpFilesize
5.7MB
-
memory/4780-185-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4780-208-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4780-182-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4780-211-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4844-157-0x0000027BB38F0000-0x0000027BB390A000-memory.dmpFilesize
104KB
-
memory/4844-156-0x0000027BB1F90000-0x0000027BB1F9C000-memory.dmpFilesize
48KB
-
memory/4844-127-0x0000027BCBF50000-0x0000027BCBFC6000-memory.dmpFilesize
472KB
-
memory/4844-124-0x0000027BB1FA0000-0x0000027BB1FC2000-memory.dmpFilesize
136KB
-
memory/4860-194-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4860-179-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4860-174-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4860-171-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4860-223-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4860-162-0x000000000048220E-mapping.dmp
-
memory/4860-167-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4860-221-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4860-438-0x0000000073E00000-0x00000000743B0000-memory.dmpFilesize
5.7MB
-
memory/4860-183-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4860-189-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4860-204-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4860-191-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4860-201-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4860-212-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4860-166-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4860-164-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4860-197-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4860-215-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4860-169-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4860-176-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4860-207-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB
-
memory/4860-258-0x0000000073E00000-0x00000000743B0000-memory.dmpFilesize
5.7MB
-
memory/4860-209-0x00000000779E0000-0x0000000077B6E000-memory.dmpFilesize
1.6MB