Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10 -
submitted
19-07-2020 19:40
Static task
static1
Behavioral task
behavioral1
Sample
sphinx_1.0.1.3.vir.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
sphinx_1.0.1.3.vir.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
sphinx_1.0.1.3.vir.exe
-
Size
1.5MB
-
MD5
b7e49c14c005991da635005f6022167d
-
SHA1
6e169aa8cb0ee6535fcb552706767554d785bcb9
-
SHA256
99429e0d24148741ba7b04a8acceb7177ee27a1c3ff6c2dd7f324a937094e270
-
SHA512
d786fa1f35262ad880b86c138419e3882c58a21efcb90376dc92fe85abce3fbfda3850792b4e55207fcb1c0ee9e8963be31d9e1fc3d66f7fc36bee95a3eae2dd
Score
8/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
Processes:
sphinx_1.0.1.3.vir.exesphinx_1.0.1.3.vir.exeypba.exedescription pid process target process PID 344 set thread context of 3864 344 sphinx_1.0.1.3.vir.exe sphinx_1.0.1.3.vir.exe PID 3864 set thread context of 3820 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 set thread context of 2892 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 2880 set thread context of 3612 2880 ypba.exe ypba.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
sphinx_1.0.1.3.vir.exeexplorer.exeypba.exeexplorer.exepid process 3864 sphinx_1.0.1.3.vir.exe 3864 sphinx_1.0.1.3.vir.exe 3864 sphinx_1.0.1.3.vir.exe 3864 sphinx_1.0.1.3.vir.exe 3864 sphinx_1.0.1.3.vir.exe 3864 sphinx_1.0.1.3.vir.exe 3820 explorer.exe 3820 explorer.exe 3820 explorer.exe 3820 explorer.exe 3612 ypba.exe 3612 ypba.exe 3820 explorer.exe 3820 explorer.exe 3820 explorer.exe 3820 explorer.exe 3820 explorer.exe 3820 explorer.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 2892 explorer.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe 3612 ypba.exe -
Executes dropped EXE 2 IoCs
Processes:
ypba.exeypba.exepid process 2880 ypba.exe 3612 ypba.exe -
NSIS installer 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Ikxyek\ypba.exe nsis_installer C:\Users\Admin\AppData\Roaming\Ikxyek\ypba.exe nsis_installer C:\Users\Admin\AppData\Roaming\Ikxyek\ypba.exe nsis_installer -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ypba.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\Currentversion\Run ypba.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\{B8FB0641-A8C5-4577-E5EA-F9EEB5D33AF9} = "C:\\Users\\Admin\\AppData\\Roaming\\Ikxyek\\ypba.exe" ypba.exe -
Loads dropped DLL 6 IoCs
Processes:
sphinx_1.0.1.3.vir.exeypba.exepid process 344 sphinx_1.0.1.3.vir.exe 344 sphinx_1.0.1.3.vir.exe 344 sphinx_1.0.1.3.vir.exe 2880 ypba.exe 2880 ypba.exe 2880 ypba.exe -
Suspicious use of WriteProcessMemory 114 IoCs
Processes:
sphinx_1.0.1.3.vir.exesphinx_1.0.1.3.vir.exeypba.exeypba.exedescription pid process target process PID 344 wrote to memory of 3864 344 sphinx_1.0.1.3.vir.exe sphinx_1.0.1.3.vir.exe PID 344 wrote to memory of 3864 344 sphinx_1.0.1.3.vir.exe sphinx_1.0.1.3.vir.exe PID 344 wrote to memory of 3864 344 sphinx_1.0.1.3.vir.exe sphinx_1.0.1.3.vir.exe PID 344 wrote to memory of 3864 344 sphinx_1.0.1.3.vir.exe sphinx_1.0.1.3.vir.exe PID 344 wrote to memory of 3864 344 sphinx_1.0.1.3.vir.exe sphinx_1.0.1.3.vir.exe PID 344 wrote to memory of 3864 344 sphinx_1.0.1.3.vir.exe sphinx_1.0.1.3.vir.exe PID 344 wrote to memory of 3864 344 sphinx_1.0.1.3.vir.exe sphinx_1.0.1.3.vir.exe PID 344 wrote to memory of 3864 344 sphinx_1.0.1.3.vir.exe sphinx_1.0.1.3.vir.exe PID 3864 wrote to memory of 3820 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 3820 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 3820 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 3820 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 3820 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 3820 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 3820 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 3820 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 2892 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 2892 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 2892 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 2892 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 2892 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 2892 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 2892 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 2892 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 2892 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 2892 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 2892 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 2892 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 2892 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 2892 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 2892 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 2892 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 2892 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 2892 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 2892 3864 sphinx_1.0.1.3.vir.exe explorer.exe PID 3864 wrote to memory of 2880 3864 sphinx_1.0.1.3.vir.exe ypba.exe PID 3864 wrote to memory of 2880 3864 sphinx_1.0.1.3.vir.exe ypba.exe PID 3864 wrote to memory of 2880 3864 sphinx_1.0.1.3.vir.exe ypba.exe PID 2880 wrote to memory of 3612 2880 ypba.exe ypba.exe PID 2880 wrote to memory of 3612 2880 ypba.exe ypba.exe PID 2880 wrote to memory of 3612 2880 ypba.exe ypba.exe PID 2880 wrote to memory of 3612 2880 ypba.exe ypba.exe PID 2880 wrote to memory of 3612 2880 ypba.exe ypba.exe PID 2880 wrote to memory of 3612 2880 ypba.exe ypba.exe PID 2880 wrote to memory of 3612 2880 ypba.exe ypba.exe PID 2880 wrote to memory of 3612 2880 ypba.exe ypba.exe PID 3864 wrote to memory of 4000 3864 sphinx_1.0.1.3.vir.exe cmd.exe PID 3864 wrote to memory of 4000 3864 sphinx_1.0.1.3.vir.exe cmd.exe PID 3864 wrote to memory of 4000 3864 sphinx_1.0.1.3.vir.exe cmd.exe PID 3612 wrote to memory of 2700 3612 ypba.exe sihost.exe PID 3612 wrote to memory of 2700 3612 ypba.exe sihost.exe PID 3612 wrote to memory of 2700 3612 ypba.exe sihost.exe PID 3612 wrote to memory of 2700 3612 ypba.exe sihost.exe PID 3612 wrote to memory of 2700 3612 ypba.exe sihost.exe PID 3612 wrote to memory of 2712 3612 ypba.exe svchost.exe PID 3612 wrote to memory of 2712 3612 ypba.exe svchost.exe PID 3612 wrote to memory of 2712 3612 ypba.exe svchost.exe PID 3612 wrote to memory of 2712 3612 ypba.exe svchost.exe PID 3612 wrote to memory of 2712 3612 ypba.exe svchost.exe PID 3612 wrote to memory of 2804 3612 ypba.exe taskhostw.exe PID 3612 wrote to memory of 2804 3612 ypba.exe taskhostw.exe PID 3612 wrote to memory of 2804 3612 ypba.exe taskhostw.exe PID 3612 wrote to memory of 2804 3612 ypba.exe taskhostw.exe PID 3612 wrote to memory of 2804 3612 ypba.exe taskhostw.exe -
Suspicious use of AdjustPrivilegeToken 322 IoCs
Processes:
sphinx_1.0.1.3.vir.exedescription pid process Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeDebugPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeDebugPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeDebugPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeDebugPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeDebugPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeDebugPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeDebugPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe Token: SeSecurityPrivilege 3864 sphinx_1.0.1.3.vir.exe -
Processes:
resource yara_rule behavioral2/memory/3820-6-0x0000000000400000-0x00000000007A5000-memory.dmp upx behavioral2/memory/3820-10-0x0000000000400000-0x00000000007A5000-memory.dmp upx behavioral2/memory/3820-12-0x0000000000400000-0x00000000007A5000-memory.dmp upx -
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Privacy explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" explorer.exe
Processes
-
c:\windows\system32\sihost.exesihost.exe1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\sphinx_1.0.1.3.vir.exe"C:\Users\Admin\AppData\Local\Temp\sphinx_1.0.1.3.vir.exe"2⤵
- Suspicious use of SetThreadContext
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\sphinx_1.0.1.3.vir.exeC:\Users\Admin\AppData\Local\Temp\sphinx_1.0.1.3.vir.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Modifies Internet Explorer settings
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe" socksParentProxy=localhost:90504⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵
-
C:\Users\Admin\AppData\Roaming\Ikxyek\ypba.exe"C:\Users\Admin\AppData\Roaming\Ikxyek\ypba.exe"4⤵
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Ikxyek\ypba.exeC:\Users\Admin\AppData\Roaming\Ikxyek\ypba.exe5⤵
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp926902c6.bat"4⤵
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppXy7vb4pc2dr3kc93kfc509b1d0arkfb2x.mca1⤵
-
C:\Program Files\Windows Mail\WinMail.exe"C:\Program Files\Windows Mail\WinMail.exe" -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp926902c6.bat
-
C:\Users\Admin\AppData\Roaming\Dhaka
-
C:\Users\Admin\AppData\Roaming\Ikxyek\ypba.exe
-
C:\Users\Admin\AppData\Roaming\Ikxyek\ypba.exe
-
C:\Users\Admin\AppData\Roaming\Ikxyek\ypba.exe
-
C:\Users\Admin\AppData\Roaming\LorikeetPhonograph
-
C:\Users\Admin\AppData\Roaming\System.dll
-
C:\Users\Admin\AppData\Roaming\coagulants.dll
-
C:\debug.txt
-
C:\debug.txt
-
C:\debug.txt
-
C:\debug.txt
-
C:\debug.txt
-
C:\debug.txt
-
C:\debug.txt
-
\Users\Admin\AppData\Roaming\System.dll
-
\Users\Admin\AppData\Roaming\System.dll
-
\Users\Admin\AppData\Roaming\coagulants.dll
-
\Users\Admin\AppData\Roaming\coagulants.dll
-
\Users\Admin\AppData\Roaming\coagulants.dll
-
\Users\Admin\AppData\Roaming\coagulants.dll
-
memory/2880-375-0x0000000000000000-mapping.dmp
-
memory/2892-395-0x0000000000401130-mapping.dmp
-
memory/2892-8-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/2892-9-0x0000000000401130-mapping.dmp
-
memory/2892-11-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/3612-386-0x000000000041E945-mapping.dmp
-
memory/3820-10-0x0000000000400000-0x00000000007A5000-memory.dmpFilesize
3.6MB
-
memory/3820-14-0x0000000006550000-0x0000000006551000-memory.dmpFilesize
4KB
-
memory/3820-7-0x00000000007A34B0-mapping.dmp
-
memory/3820-196-0x0000000005D50000-0x0000000005D51000-memory.dmpFilesize
4KB
-
memory/3820-6-0x0000000000400000-0x00000000007A5000-memory.dmpFilesize
3.6MB
-
memory/3820-194-0x0000000005D50000-0x0000000005D51000-memory.dmpFilesize
4KB
-
memory/3820-391-0x00000000007A34B0-mapping.dmp
-
memory/3820-13-0x0000000005D50000-0x0000000005D51000-memory.dmpFilesize
4KB
-
memory/3820-195-0x0000000006550000-0x0000000006551000-memory.dmpFilesize
4KB
-
memory/3820-15-0x0000000005D50000-0x0000000005D51000-memory.dmpFilesize
4KB
-
memory/3820-12-0x0000000000400000-0x00000000007A5000-memory.dmpFilesize
3.6MB
-
memory/3864-4-0x000000000041E945-mapping.dmp
-
memory/3864-3-0x0000000000400000-0x000000000058F000-memory.dmpFilesize
1.6MB
-
memory/3864-5-0x0000000000400000-0x000000000058F000-memory.dmpFilesize
1.6MB
-
memory/4000-389-0x0000000000000000-mapping.dmp