Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows10_x64 -
resource
win10 -
submitted
12-07-2020 08:08
Static task
static1
Behavioral task
behavioral1
Sample
acrord32.dll
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
acrord32.dll
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
acrord32.dll
-
Size
360KB
-
MD5
f888bb77af9018a617b8a74d739ac29f
-
SHA1
68f9fc2139713cd3913a443f67f24f8ce028c8d2
-
SHA256
1f4c6010859130ce9df006aa169ce1840624de8da5fee845f209c2a7d6b606a8
-
SHA512
c71fb42538ee406c3834f73fb664cd7f8213ef4a0df66c2380a1b70f5ef2a76399ca3835fea1105b1c20fa8f1a717b358fec0cb755a99a34c7e9d086145bce81
Score
8/10
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3616 3852 WerFault.exe rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 3616 WerFault.exe Token: SeBackupPrivilege 3616 WerFault.exe Token: SeDebugPrivilege 3616 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
WerFault.exeAcroRd32.exepid process 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3616 WerFault.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Suspicious use of WriteProcessMemory 259 IoCs
Processes:
rundll32.exerundll32.exeAcroRd32.exeRdrCEF.exedescription pid process target process PID 976 wrote to memory of 3852 976 rundll32.exe rundll32.exe PID 976 wrote to memory of 3852 976 rundll32.exe rundll32.exe PID 976 wrote to memory of 3852 976 rundll32.exe rundll32.exe PID 3852 wrote to memory of 3896 3852 rundll32.exe AcroRd32.exe PID 3852 wrote to memory of 3896 3852 rundll32.exe AcroRd32.exe PID 3852 wrote to memory of 3896 3852 rundll32.exe AcroRd32.exe PID 3896 wrote to memory of 1644 3896 AcroRd32.exe RdrCEF.exe PID 3896 wrote to memory of 1644 3896 AcroRd32.exe RdrCEF.exe PID 3896 wrote to memory of 1644 3896 AcroRd32.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 676 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 820 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 820 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 820 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 820 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 820 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 820 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 820 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 820 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 820 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 820 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 820 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 820 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 820 1644 RdrCEF.exe RdrCEF.exe PID 1644 wrote to memory of 820 1644 RdrCEF.exe RdrCEF.exe -
Blacklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 1 3852 rundll32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000_Classes\Local Settings rundll32.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
AcroRd32.exepid process 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe 3896 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 3896 AcroRd32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acrord32.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acrord32.dll,#12⤵
- Suspicious use of WriteProcessMemory
- Blacklisted process makes network request
- Modifies registry class
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\DOC000(54).pdf"3⤵
- Suspicious behavior: EnumeratesProcesses
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of FindShellTrayWindow
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140434⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E091890130E20292C5DDAB6EFEB0B5A6 --mojo-platform-channel-handle=1636 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=F3ABDCB4E1B01880E4CE276B3BA47981 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=F3ABDCB4E1B01880E4CE276B3BA47981 --renderer-client-id=2 --mojo-platform-channel-handle=1628 --allow-no-sandbox-job /prefetch:15⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=EC8D6C96CF3F42CD93980DA2F717929D --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=EC8D6C96CF3F42CD93980DA2F717929D --renderer-client-id=4 --mojo-platform-channel-handle=2200 --allow-no-sandbox-job /prefetch:15⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=ECE12B91BA4BF50A0CA2F941990A2826 --mojo-platform-channel-handle=2352 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E8B99E373CBE4DD1A6C7A2315FFECD49 --mojo-platform-channel-handle=2676 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8C2A8ADC387D9C0BA00C5DABAB36AA6F --mojo-platform-channel-handle=2788 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:25⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3852 -s 16563⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\DOC000(54).pdf
-
memory/676-21-0x0000000000000000-mapping.dmp
-
memory/676-20-0x0000000077542000-0x000000007754200C-memory.dmpFilesize
12B
-
memory/820-24-0x0000000000000000-mapping.dmp
-
memory/820-23-0x0000000077542000-0x000000007754200C-memory.dmpFilesize
12B
-
memory/1516-29-0x0000000000000000-mapping.dmp
-
memory/1516-28-0x0000000077542000-0x000000007754200C-memory.dmpFilesize
12B
-
memory/1644-19-0x0000000000000000-mapping.dmp
-
memory/1716-34-0x0000000000000000-mapping.dmp
-
memory/1716-33-0x0000000077542000-0x000000007754200C-memory.dmpFilesize
12B
-
memory/2820-36-0x0000000077542000-0x000000007754200C-memory.dmpFilesize
12B
-
memory/2820-37-0x0000000000000000-mapping.dmp
-
memory/3616-14-0x0000000004C30000-0x0000000004C31000-memory.dmpFilesize
4KB
-
memory/3616-3-0x0000000004500000-0x0000000004501000-memory.dmpFilesize
4KB
-
memory/3852-8-0x0000000000000000-mapping.dmp
-
memory/3852-6-0x0000000000000000-mapping.dmp
-
memory/3852-11-0x0000000000000000-mapping.dmp
-
memory/3852-10-0x0000000000000000-mapping.dmp
-
memory/3852-9-0x0000000000000000-mapping.dmp
-
memory/3852-13-0x0000000000000000-mapping.dmp
-
memory/3852-7-0x0000000000000000-mapping.dmp
-
memory/3852-12-0x0000000000000000-mapping.dmp
-
memory/3852-5-0x0000000000000000-mapping.dmp
-
memory/3852-4-0x0000000000000000-mapping.dmp
-
memory/3852-0-0x0000000000000000-mapping.dmp
-
memory/3896-1-0x0000000000000000-mapping.dmp
-
memory/3908-39-0x0000000077542000-0x000000007754200C-memory.dmpFilesize
12B
-
memory/3908-40-0x0000000000000000-mapping.dmp