Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
18-02-2023 21:51
Static task
static1
General
-
Target
f131a0e946a38875adb5c6bbf024eca15ecbf9038be4febe09cb539190cd7062.exe
-
Size
245KB
-
MD5
db58fe20918f027a03873fa02d6c8b2e
-
SHA1
2d57885cc841b38dcd6173369607a895b3dfad8d
-
SHA256
f131a0e946a38875adb5c6bbf024eca15ecbf9038be4febe09cb539190cd7062
-
SHA512
75462c83355e1117be061072418761bf6bf4a0f7afcbe2d0289362cf2fe487108f78b5a000ef41a71657474cc2da9ed7fecb099d160dbc4d09189ec961bfb2ea
-
SSDEEP
3072:4E26uUALupyqn/RtpRFaUHb7lZ+1uHIw43KrC001zvoZH6sCKAVUy:zztALupxRnaMbBZfC6rC0oUZasC
Malware Config
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4784-133-0x00000000021A0000-0x00000000021A9000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
AF3D.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ AF3D.exe -
Downloads MZ/PE file
-
.NET Reactor proctector 3 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\45B4.exe net_reactor C:\Users\Admin\AppData\Local\Temp\45B4.exe net_reactor behavioral1/memory/2740-139-0x0000000000BF0000-0x0000000001466000-memory.dmp net_reactor -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
AF3D.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AF3D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AF3D.exe -
Executes dropped EXE 5 IoCs
Processes:
45B4.exe5063.exeAF3D.exeC382.exeCC8B.exepid process 2740 45B4.exe 1852 5063.exe 1936 AF3D.exe 2504 C382.exe 3436 CC8B.exe -
Obfuscated with Agile.Net obfuscator 3 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1936-159-0x0000000000170000-0x0000000000E7E000-memory.dmp agile_net behavioral1/memory/1936-160-0x0000000000170000-0x0000000000E7E000-memory.dmp agile_net behavioral1/memory/1936-203-0x0000000000170000-0x0000000000E7E000-memory.dmp agile_net -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\AF3D.exe themida C:\Users\Admin\AppData\Local\Temp\AF3D.exe themida behavioral1/memory/1936-159-0x0000000000170000-0x0000000000E7E000-memory.dmp themida behavioral1/memory/1936-160-0x0000000000170000-0x0000000000E7E000-memory.dmp themida behavioral1/memory/1936-203-0x0000000000170000-0x0000000000E7E000-memory.dmp themida -
Uses the VBS compiler for execution 1 TTPs
-
Processes:
AF3D.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AF3D.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 95 ip-api.com 97 icanhazip.com -
Suspicious use of SetThreadContext 2 IoCs
Processes:
45B4.exeC382.exedescription pid process target process PID 2740 set thread context of 3596 2740 45B4.exe InstallUtil.exe PID 2504 set thread context of 4304 2504 C382.exe vbc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3444 2504 WerFault.exe C382.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
f131a0e946a38875adb5c6bbf024eca15ecbf9038be4febe09cb539190cd7062.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f131a0e946a38875adb5c6bbf024eca15ecbf9038be4febe09cb539190cd7062.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f131a0e946a38875adb5c6bbf024eca15ecbf9038be4febe09cb539190cd7062.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI f131a0e946a38875adb5c6bbf024eca15ecbf9038be4febe09cb539190cd7062.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AF3D.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AF3D.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 AF3D.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier AF3D.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AF3D.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
f131a0e946a38875adb5c6bbf024eca15ecbf9038be4febe09cb539190cd7062.exepid process 4784 f131a0e946a38875adb5c6bbf024eca15ecbf9038be4febe09cb539190cd7062.exe 4784 f131a0e946a38875adb5c6bbf024eca15ecbf9038be4febe09cb539190cd7062.exe 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2644 -
Suspicious behavior: MapViewOfSection 19 IoCs
Processes:
f131a0e946a38875adb5c6bbf024eca15ecbf9038be4febe09cb539190cd7062.exepid process 4784 f131a0e946a38875adb5c6bbf024eca15ecbf9038be4febe09cb539190cd7062.exe 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 2644 -
Suspicious use of AdjustPrivilegeToken 22 IoCs
Processes:
45B4.exeAF3D.exemsiexec.exevbc.exedescription pid process Token: SeDebugPrivilege 2740 45B4.exe Token: SeDebugPrivilege 1936 AF3D.exe Token: SeShutdownPrivilege 2644 Token: SeCreatePagefilePrivilege 2644 Token: SeShutdownPrivilege 2644 Token: SeCreatePagefilePrivilege 2644 Token: SeShutdownPrivilege 2644 Token: SeCreatePagefilePrivilege 2644 Token: SeShutdownPrivilege 2644 Token: SeCreatePagefilePrivilege 2644 Token: SeSecurityPrivilege 4344 msiexec.exe Token: SeShutdownPrivilege 2644 Token: SeCreatePagefilePrivilege 2644 Token: SeDebugPrivilege 4304 vbc.exe Token: SeShutdownPrivilege 2644 Token: SeCreatePagefilePrivilege 2644 Token: SeShutdownPrivilege 2644 Token: SeCreatePagefilePrivilege 2644 Token: SeShutdownPrivilege 2644 Token: SeCreatePagefilePrivilege 2644 Token: SeShutdownPrivilege 2644 Token: SeCreatePagefilePrivilege 2644 -
Suspicious use of WriteProcessMemory 58 IoCs
Processes:
45B4.exeC382.exedescription pid process target process PID 2644 wrote to memory of 2740 2644 45B4.exe PID 2644 wrote to memory of 2740 2644 45B4.exe PID 2740 wrote to memory of 3596 2740 45B4.exe InstallUtil.exe PID 2740 wrote to memory of 3596 2740 45B4.exe InstallUtil.exe PID 2740 wrote to memory of 3596 2740 45B4.exe InstallUtil.exe PID 2740 wrote to memory of 3596 2740 45B4.exe InstallUtil.exe PID 2740 wrote to memory of 3596 2740 45B4.exe InstallUtil.exe PID 2740 wrote to memory of 3596 2740 45B4.exe InstallUtil.exe PID 2740 wrote to memory of 3596 2740 45B4.exe InstallUtil.exe PID 2740 wrote to memory of 3596 2740 45B4.exe InstallUtil.exe PID 2644 wrote to memory of 1852 2644 5063.exe PID 2644 wrote to memory of 1852 2644 5063.exe PID 2644 wrote to memory of 1936 2644 AF3D.exe PID 2644 wrote to memory of 1936 2644 AF3D.exe PID 2644 wrote to memory of 1936 2644 AF3D.exe PID 2644 wrote to memory of 2504 2644 C382.exe PID 2644 wrote to memory of 2504 2644 C382.exe PID 2644 wrote to memory of 2504 2644 C382.exe PID 2504 wrote to memory of 4304 2504 C382.exe vbc.exe PID 2504 wrote to memory of 4304 2504 C382.exe vbc.exe PID 2504 wrote to memory of 4304 2504 C382.exe vbc.exe PID 2504 wrote to memory of 4304 2504 C382.exe vbc.exe PID 2504 wrote to memory of 4304 2504 C382.exe vbc.exe PID 2644 wrote to memory of 3436 2644 CC8B.exe PID 2644 wrote to memory of 3436 2644 CC8B.exe PID 2644 wrote to memory of 4868 2644 explorer.exe PID 2644 wrote to memory of 4868 2644 explorer.exe PID 2644 wrote to memory of 4868 2644 explorer.exe PID 2644 wrote to memory of 4868 2644 explorer.exe PID 2644 wrote to memory of 4268 2644 explorer.exe PID 2644 wrote to memory of 4268 2644 explorer.exe PID 2644 wrote to memory of 4268 2644 explorer.exe PID 2644 wrote to memory of 4260 2644 explorer.exe PID 2644 wrote to memory of 4260 2644 explorer.exe PID 2644 wrote to memory of 4260 2644 explorer.exe PID 2644 wrote to memory of 4260 2644 explorer.exe PID 2644 wrote to memory of 4280 2644 explorer.exe PID 2644 wrote to memory of 4280 2644 explorer.exe PID 2644 wrote to memory of 4280 2644 explorer.exe PID 2644 wrote to memory of 1212 2644 explorer.exe PID 2644 wrote to memory of 1212 2644 explorer.exe PID 2644 wrote to memory of 1212 2644 explorer.exe PID 2644 wrote to memory of 1212 2644 explorer.exe PID 2644 wrote to memory of 4072 2644 explorer.exe PID 2644 wrote to memory of 4072 2644 explorer.exe PID 2644 wrote to memory of 4072 2644 explorer.exe PID 2644 wrote to memory of 4072 2644 explorer.exe PID 2644 wrote to memory of 2568 2644 explorer.exe PID 2644 wrote to memory of 2568 2644 explorer.exe PID 2644 wrote to memory of 2568 2644 explorer.exe PID 2644 wrote to memory of 2568 2644 explorer.exe PID 2644 wrote to memory of 2932 2644 explorer.exe PID 2644 wrote to memory of 2932 2644 explorer.exe PID 2644 wrote to memory of 2932 2644 explorer.exe PID 2644 wrote to memory of 1460 2644 explorer.exe PID 2644 wrote to memory of 1460 2644 explorer.exe PID 2644 wrote to memory of 1460 2644 explorer.exe PID 2644 wrote to memory of 1460 2644 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f131a0e946a38875adb5c6bbf024eca15ecbf9038be4febe09cb539190cd7062.exe"C:\Users\Admin\AppData\Local\Temp\f131a0e946a38875adb5c6bbf024eca15ecbf9038be4febe09cb539190cd7062.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\45B4.exeC:\Users\Admin\AppData\Local\Temp\45B4.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\5063.exeC:\Users\Admin\AppData\Local\Temp\5063.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\AF3D.exeC:\Users\Admin\AppData\Local\Temp\AF3D.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\C382.exeC:\Users\Admin\AppData\Local\Temp\C382.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 2602⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2504 -ip 25041⤵
-
C:\Users\Admin\AppData\Local\Temp\CC8B.exeC:\Users\Admin\AppData\Local\Temp\CC8B.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\45B4.exeFilesize
8.4MB
MD5d38e84427edbc6789f1bb12ae69c6dc5
SHA1718aa1778e1ad4a23b53adea4dbabeeb39b89f94
SHA256bd4e3e2c455b2322b4b874a319a14c638e6b567c7c1e83edc839ac05aee1a6a4
SHA512271966fc13137d5cda7eb9283c3c9c77361dd10d37eef713d0ac9c08326d930c1202d7470f1f2ad9e66f2a798354f09ce846139a8e2ca2b91d7719c215a68948
-
C:\Users\Admin\AppData\Local\Temp\45B4.exeFilesize
8.4MB
MD5d38e84427edbc6789f1bb12ae69c6dc5
SHA1718aa1778e1ad4a23b53adea4dbabeeb39b89f94
SHA256bd4e3e2c455b2322b4b874a319a14c638e6b567c7c1e83edc839ac05aee1a6a4
SHA512271966fc13137d5cda7eb9283c3c9c77361dd10d37eef713d0ac9c08326d930c1202d7470f1f2ad9e66f2a798354f09ce846139a8e2ca2b91d7719c215a68948
-
C:\Users\Admin\AppData\Local\Temp\5063.exeFilesize
4KB
MD59748489855d9dd82ab09da5e3e55b19e
SHA16ed2bf6a1a53a59cd2137812cb43b5032817f6a1
SHA25605bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b
SHA5127eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be
-
C:\Users\Admin\AppData\Local\Temp\5063.exeFilesize
4KB
MD59748489855d9dd82ab09da5e3e55b19e
SHA16ed2bf6a1a53a59cd2137812cb43b5032817f6a1
SHA25605bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b
SHA5127eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be
-
C:\Users\Admin\AppData\Local\Temp\AF3D.exeFilesize
5.3MB
MD5870406ba58703185ab2c177bd7c1ecaf
SHA1e5f688ee7319c5391ccc3215f4cae5323870aca9
SHA256256c47ac22e3569ad793c5a687f4f7a2e8835e4a33e1585fbf7625c4d760643e
SHA512f63f8c9d4613c0de73df3ba11cb9331889bbfbb6219873bd7ddd503b2e9d85fe0cd2a5ef349f7567a7cad3bade33a068c5007a7cf83417cb7da00294b69727a2
-
C:\Users\Admin\AppData\Local\Temp\AF3D.exeFilesize
5.3MB
MD5870406ba58703185ab2c177bd7c1ecaf
SHA1e5f688ee7319c5391ccc3215f4cae5323870aca9
SHA256256c47ac22e3569ad793c5a687f4f7a2e8835e4a33e1585fbf7625c4d760643e
SHA512f63f8c9d4613c0de73df3ba11cb9331889bbfbb6219873bd7ddd503b2e9d85fe0cd2a5ef349f7567a7cad3bade33a068c5007a7cf83417cb7da00294b69727a2
-
C:\Users\Admin\AppData\Local\Temp\C382.exeFilesize
1.1MB
MD5b5cd4deb250cbeda544d8622d7ed90bf
SHA1d8f784eba044a176e935cd6bc9a97d346a810c98
SHA2568f4b3502e38100486b960ef7d7aea1c43ba2ba38f5d31439b1ae9324c3f43621
SHA5121a828445c797a4af0279eb2d0ba2e973b2768da5eeec6ebc42c104a1bf689268798380b8da2496757d7ee0e61f10cadadc7369fb5cb535d13260d7721562f2ae
-
C:\Users\Admin\AppData\Local\Temp\C382.exeFilesize
1.1MB
MD5b5cd4deb250cbeda544d8622d7ed90bf
SHA1d8f784eba044a176e935cd6bc9a97d346a810c98
SHA2568f4b3502e38100486b960ef7d7aea1c43ba2ba38f5d31439b1ae9324c3f43621
SHA5121a828445c797a4af0279eb2d0ba2e973b2768da5eeec6ebc42c104a1bf689268798380b8da2496757d7ee0e61f10cadadc7369fb5cb535d13260d7721562f2ae
-
C:\Users\Admin\AppData\Local\Temp\CC8B.exeFilesize
4KB
MD59748489855d9dd82ab09da5e3e55b19e
SHA16ed2bf6a1a53a59cd2137812cb43b5032817f6a1
SHA25605bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b
SHA5127eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be
-
C:\Users\Admin\AppData\Local\Temp\CC8B.exeFilesize
4KB
MD59748489855d9dd82ab09da5e3e55b19e
SHA16ed2bf6a1a53a59cd2137812cb43b5032817f6a1
SHA25605bdd09d934144589f7b90ac4ef6e8d7743c35f551219d98bc7fc933f98a157b
SHA5127eebbc3e42aad1af304ba38ca0c74e5f2293a630d98d4cfd48957f5f288bcb52cf323421c2b166e3b459450d5ef024167f8729b7b4b66651a34c3c3d4581a2be
-
memory/1212-202-0x0000000000F90000-0x0000000000FB7000-memory.dmpFilesize
156KB
-
memory/1212-201-0x0000000000FC0000-0x0000000000FE2000-memory.dmpFilesize
136KB
-
memory/1212-200-0x0000000000000000-mapping.dmp
-
memory/1212-219-0x0000000000FC0000-0x0000000000FE2000-memory.dmpFilesize
136KB
-
memory/1460-222-0x0000000000420000-0x0000000000428000-memory.dmpFilesize
32KB
-
memory/1460-213-0x0000000000000000-mapping.dmp
-
memory/1460-214-0x0000000000420000-0x0000000000428000-memory.dmpFilesize
32KB
-
memory/1460-215-0x0000000000410000-0x000000000041B000-memory.dmpFilesize
44KB
-
memory/1852-146-0x0000000000000000-mapping.dmp
-
memory/1852-149-0x0000000000CA0000-0x0000000000CA8000-memory.dmpFilesize
32KB
-
memory/1852-150-0x00007FFA046C0000-0x00007FFA05181000-memory.dmpFilesize
10.8MB
-
memory/1936-160-0x0000000000170000-0x0000000000E7E000-memory.dmpFilesize
13.1MB
-
memory/1936-153-0x0000000000000000-mapping.dmp
-
memory/1936-156-0x0000000000170000-0x0000000000E7E000-memory.dmpFilesize
13.1MB
-
memory/1936-159-0x0000000000170000-0x0000000000E7E000-memory.dmpFilesize
13.1MB
-
memory/1936-178-0x0000000007290000-0x0000000007834000-memory.dmpFilesize
5.6MB
-
memory/1936-161-0x00000000056E0000-0x0000000005746000-memory.dmpFilesize
408KB
-
memory/1936-203-0x0000000000170000-0x0000000000E7E000-memory.dmpFilesize
13.1MB
-
memory/1936-176-0x0000000006C40000-0x0000000006CD2000-memory.dmpFilesize
584KB
-
memory/1936-184-0x0000000000170000-0x0000000000E7E000-memory.dmpFilesize
13.1MB
-
memory/2504-162-0x0000000000000000-mapping.dmp
-
memory/2504-175-0x0000000000680000-0x0000000000798000-memory.dmpFilesize
1.1MB
-
memory/2568-221-0x0000000000DC0000-0x0000000000DC6000-memory.dmpFilesize
24KB
-
memory/2568-209-0x0000000000DB0000-0x0000000000DBB000-memory.dmpFilesize
44KB
-
memory/2568-208-0x0000000000DC0000-0x0000000000DC6000-memory.dmpFilesize
24KB
-
memory/2568-207-0x0000000000000000-mapping.dmp
-
memory/2740-139-0x0000000000BF0000-0x0000000001466000-memory.dmpFilesize
8.5MB
-
memory/2740-141-0x00007FFA046C0000-0x00007FFA05181000-memory.dmpFilesize
10.8MB
-
memory/2740-136-0x0000000000000000-mapping.dmp
-
memory/2740-145-0x00007FFA046C0000-0x00007FFA05181000-memory.dmpFilesize
10.8MB
-
memory/2932-210-0x0000000000000000-mapping.dmp
-
memory/2932-212-0x0000000000370000-0x000000000037D000-memory.dmpFilesize
52KB
-
memory/2932-211-0x0000000000380000-0x0000000000387000-memory.dmpFilesize
28KB
-
memory/3436-181-0x00007FFA046C0000-0x00007FFA05181000-memory.dmpFilesize
10.8MB
-
memory/3436-177-0x0000000000000000-mapping.dmp
-
memory/3596-142-0x00000000004088B8-mapping.dmp
-
memory/3596-140-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/3596-152-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/3596-144-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/3596-151-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/4072-204-0x0000000000000000-mapping.dmp
-
memory/4072-205-0x0000000000810000-0x0000000000815000-memory.dmpFilesize
20KB
-
memory/4072-206-0x0000000000800000-0x0000000000809000-memory.dmpFilesize
36KB
-
memory/4072-220-0x0000000000810000-0x0000000000815000-memory.dmpFilesize
20KB
-
memory/4260-191-0x0000000000000000-mapping.dmp
-
memory/4260-193-0x0000000000390000-0x0000000000395000-memory.dmpFilesize
20KB
-
memory/4260-194-0x0000000000380000-0x0000000000389000-memory.dmpFilesize
36KB
-
memory/4260-217-0x0000000000390000-0x0000000000395000-memory.dmpFilesize
20KB
-
memory/4268-187-0x00000000009B0000-0x00000000009B9000-memory.dmpFilesize
36KB
-
memory/4268-183-0x0000000000000000-mapping.dmp
-
memory/4268-188-0x00000000009A0000-0x00000000009AF000-memory.dmpFilesize
60KB
-
memory/4280-198-0x0000000000310000-0x0000000000316000-memory.dmpFilesize
24KB
-
memory/4280-199-0x0000000000300000-0x000000000030C000-memory.dmpFilesize
48KB
-
memory/4280-197-0x0000000000000000-mapping.dmp
-
memory/4280-218-0x0000000000310000-0x0000000000316000-memory.dmpFilesize
24KB
-
memory/4304-192-0x0000000006A70000-0x0000000006AC0000-memory.dmpFilesize
320KB
-
memory/4304-173-0x0000000005020000-0x000000000512A000-memory.dmpFilesize
1.0MB
-
memory/4304-189-0x00000000069F0000-0x0000000006A66000-memory.dmpFilesize
472KB
-
memory/4304-195-0x0000000006C90000-0x0000000006E52000-memory.dmpFilesize
1.8MB
-
memory/4304-165-0x0000000000000000-mapping.dmp
-
memory/4304-166-0x00000000007C0000-0x0000000000804000-memory.dmpFilesize
272KB
-
memory/4304-171-0x00000000054F0000-0x0000000005B08000-memory.dmpFilesize
6.1MB
-
memory/4304-196-0x0000000007A50000-0x0000000007F7C000-memory.dmpFilesize
5.2MB
-
memory/4304-172-0x0000000004EF0000-0x0000000004F02000-memory.dmpFilesize
72KB
-
memory/4304-190-0x0000000006210000-0x000000000622E000-memory.dmpFilesize
120KB
-
memory/4304-174-0x0000000004F50000-0x0000000004F8C000-memory.dmpFilesize
240KB
-
memory/4784-134-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/4784-133-0x00000000021A0000-0x00000000021A9000-memory.dmpFilesize
36KB
-
memory/4784-132-0x000000000059C000-0x00000000005B1000-memory.dmpFilesize
84KB
-
memory/4784-135-0x0000000000400000-0x0000000000467000-memory.dmpFilesize
412KB
-
memory/4868-216-0x0000000000730000-0x0000000000737000-memory.dmpFilesize
28KB
-
memory/4868-182-0x0000000000000000-mapping.dmp
-
memory/4868-185-0x0000000000730000-0x0000000000737000-memory.dmpFilesize
28KB
-
memory/4868-186-0x0000000000720000-0x000000000072B000-memory.dmpFilesize
44KB