Analysis
-
max time kernel
153s -
max time network
155s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
05-11-2020 18:51
Static task
static1
Behavioral task
behavioral1
Sample
bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe
Resource
win7v20201028
General
-
Target
bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe
-
Size
251KB
-
MD5
42c4dc5105eff86f69d8c3d0d1e9e773
-
SHA1
a4c1c4f627ac87cb180f3e70751bf525ef658def
-
SHA256
bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742
-
SHA512
8017b10da3f275a719dee0d7cdea1fc066af93a99748501d4d2519827f651d1dd7dbab5bab8f8ed268ef5cb72573c6f95a0e77e4e5e0af68a08a524feab8d91f
Malware Config
Extracted
darkcomet
User
tarkovbanned.hopto.org:1337
DC_MUTEX-BBUXYWX
-
InstallPath
nVidiaExpe\nvmdch.exe
-
gencode
bZniVw7x2f7P
-
install
true
-
offline_keylogger
true
-
persistence
true
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\nVidiaExpe\\nvmdch.exe" bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe -
Disables RegEdit via registry modification
-
Executes dropped EXE 1 IoCs
Processes:
nvmdch.exepid process 1740 nvmdch.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\nVidiaExpe\nvmdch.exe upx C:\Users\Admin\AppData\Roaming\nVidiaExpe\nvmdch.exe upx \Users\Admin\AppData\Roaming\nVidiaExpe\nvmdch.exe upx C:\Users\Admin\AppData\Roaming\nVidiaExpe\nvmdch.exe upx behavioral1/memory/1724-12-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1724-14-0x0000000000400000-0x00000000004B7000-memory.dmp upx behavioral1/memory/1724-15-0x0000000000400000-0x00000000004B7000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
notepad.exepid process 2024 notepad.exe -
Loads dropped DLL 2 IoCs
Processes:
bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exepid process 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exenvmdch.exeiexplore.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\nVidiaExpe\\nvmdch.exe" bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\nVidiaExpe\\nvmdch.exe" nvmdch.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\nVidiaExpe\\nvmdch.exe" iexplore.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
nvmdch.exedescription pid process target process PID 1740 set thread context of 1724 1740 nvmdch.exe iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 1724 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exenvmdch.exeiexplore.exedescription pid process Token: SeIncreaseQuotaPrivilege 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: SeSecurityPrivilege 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: SeTakeOwnershipPrivilege 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: SeLoadDriverPrivilege 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: SeSystemProfilePrivilege 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: SeSystemtimePrivilege 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: SeProfSingleProcessPrivilege 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: SeIncBasePriorityPrivilege 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: SeCreatePagefilePrivilege 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: SeBackupPrivilege 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: SeRestorePrivilege 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: SeShutdownPrivilege 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: SeDebugPrivilege 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: SeSystemEnvironmentPrivilege 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: SeChangeNotifyPrivilege 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: SeRemoteShutdownPrivilege 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: SeUndockPrivilege 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: SeManageVolumePrivilege 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: SeImpersonatePrivilege 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: SeCreateGlobalPrivilege 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: 33 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: 34 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: 35 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe Token: SeIncreaseQuotaPrivilege 1740 nvmdch.exe Token: SeSecurityPrivilege 1740 nvmdch.exe Token: SeTakeOwnershipPrivilege 1740 nvmdch.exe Token: SeLoadDriverPrivilege 1740 nvmdch.exe Token: SeSystemProfilePrivilege 1740 nvmdch.exe Token: SeSystemtimePrivilege 1740 nvmdch.exe Token: SeProfSingleProcessPrivilege 1740 nvmdch.exe Token: SeIncBasePriorityPrivilege 1740 nvmdch.exe Token: SeCreatePagefilePrivilege 1740 nvmdch.exe Token: SeBackupPrivilege 1740 nvmdch.exe Token: SeRestorePrivilege 1740 nvmdch.exe Token: SeShutdownPrivilege 1740 nvmdch.exe Token: SeDebugPrivilege 1740 nvmdch.exe Token: SeSystemEnvironmentPrivilege 1740 nvmdch.exe Token: SeChangeNotifyPrivilege 1740 nvmdch.exe Token: SeRemoteShutdownPrivilege 1740 nvmdch.exe Token: SeUndockPrivilege 1740 nvmdch.exe Token: SeManageVolumePrivilege 1740 nvmdch.exe Token: SeImpersonatePrivilege 1740 nvmdch.exe Token: SeCreateGlobalPrivilege 1740 nvmdch.exe Token: 33 1740 nvmdch.exe Token: 34 1740 nvmdch.exe Token: 35 1740 nvmdch.exe Token: SeIncreaseQuotaPrivilege 1724 iexplore.exe Token: SeSecurityPrivilege 1724 iexplore.exe Token: SeTakeOwnershipPrivilege 1724 iexplore.exe Token: SeLoadDriverPrivilege 1724 iexplore.exe Token: SeSystemProfilePrivilege 1724 iexplore.exe Token: SeSystemtimePrivilege 1724 iexplore.exe Token: SeProfSingleProcessPrivilege 1724 iexplore.exe Token: SeIncBasePriorityPrivilege 1724 iexplore.exe Token: SeCreatePagefilePrivilege 1724 iexplore.exe Token: SeBackupPrivilege 1724 iexplore.exe Token: SeRestorePrivilege 1724 iexplore.exe Token: SeShutdownPrivilege 1724 iexplore.exe Token: SeDebugPrivilege 1724 iexplore.exe Token: SeSystemEnvironmentPrivilege 1724 iexplore.exe Token: SeChangeNotifyPrivilege 1724 iexplore.exe Token: SeRemoteShutdownPrivilege 1724 iexplore.exe Token: SeUndockPrivilege 1724 iexplore.exe Token: SeManageVolumePrivilege 1724 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
iexplore.exepid process 1724 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.execmd.execmd.exenvmdch.exeiexplore.exedescription pid process target process PID 1688 wrote to memory of 1136 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe cmd.exe PID 1688 wrote to memory of 1136 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe cmd.exe PID 1688 wrote to memory of 1136 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe cmd.exe PID 1688 wrote to memory of 1136 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe cmd.exe PID 1688 wrote to memory of 1332 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe cmd.exe PID 1688 wrote to memory of 1332 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe cmd.exe PID 1688 wrote to memory of 1332 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe cmd.exe PID 1688 wrote to memory of 1332 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe cmd.exe PID 1688 wrote to memory of 2024 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe notepad.exe PID 1688 wrote to memory of 2024 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe notepad.exe PID 1688 wrote to memory of 2024 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe notepad.exe PID 1688 wrote to memory of 2024 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe notepad.exe PID 1688 wrote to memory of 2024 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe notepad.exe PID 1688 wrote to memory of 2024 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe notepad.exe PID 1688 wrote to memory of 2024 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe notepad.exe PID 1688 wrote to memory of 2024 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe notepad.exe PID 1688 wrote to memory of 2024 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe notepad.exe PID 1688 wrote to memory of 2024 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe notepad.exe PID 1688 wrote to memory of 2024 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe notepad.exe PID 1688 wrote to memory of 2024 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe notepad.exe PID 1688 wrote to memory of 2024 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe notepad.exe PID 1688 wrote to memory of 2024 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe notepad.exe PID 1688 wrote to memory of 2024 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe notepad.exe PID 1688 wrote to memory of 2024 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe notepad.exe PID 1688 wrote to memory of 2024 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe notepad.exe PID 1688 wrote to memory of 2024 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe notepad.exe PID 1332 wrote to memory of 588 1332 cmd.exe attrib.exe PID 1332 wrote to memory of 588 1332 cmd.exe attrib.exe PID 1332 wrote to memory of 588 1332 cmd.exe attrib.exe PID 1332 wrote to memory of 588 1332 cmd.exe attrib.exe PID 1136 wrote to memory of 268 1136 cmd.exe attrib.exe PID 1136 wrote to memory of 268 1136 cmd.exe attrib.exe PID 1136 wrote to memory of 268 1136 cmd.exe attrib.exe PID 1136 wrote to memory of 268 1136 cmd.exe attrib.exe PID 1688 wrote to memory of 1740 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe nvmdch.exe PID 1688 wrote to memory of 1740 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe nvmdch.exe PID 1688 wrote to memory of 1740 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe nvmdch.exe PID 1688 wrote to memory of 1740 1688 bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe nvmdch.exe PID 1740 wrote to memory of 1724 1740 nvmdch.exe iexplore.exe PID 1740 wrote to memory of 1724 1740 nvmdch.exe iexplore.exe PID 1740 wrote to memory of 1724 1740 nvmdch.exe iexplore.exe PID 1740 wrote to memory of 1724 1740 nvmdch.exe iexplore.exe PID 1740 wrote to memory of 1724 1740 nvmdch.exe iexplore.exe PID 1740 wrote to memory of 1724 1740 nvmdch.exe iexplore.exe PID 1724 wrote to memory of 1664 1724 iexplore.exe notepad.exe PID 1724 wrote to memory of 1664 1724 iexplore.exe notepad.exe PID 1724 wrote to memory of 1664 1724 iexplore.exe notepad.exe PID 1724 wrote to memory of 1664 1724 iexplore.exe notepad.exe PID 1724 wrote to memory of 1664 1724 iexplore.exe notepad.exe PID 1724 wrote to memory of 1664 1724 iexplore.exe notepad.exe PID 1724 wrote to memory of 1664 1724 iexplore.exe notepad.exe PID 1724 wrote to memory of 1664 1724 iexplore.exe notepad.exe PID 1724 wrote to memory of 1664 1724 iexplore.exe notepad.exe PID 1724 wrote to memory of 1664 1724 iexplore.exe notepad.exe PID 1724 wrote to memory of 1664 1724 iexplore.exe notepad.exe PID 1724 wrote to memory of 1664 1724 iexplore.exe notepad.exe PID 1724 wrote to memory of 1664 1724 iexplore.exe notepad.exe PID 1724 wrote to memory of 1664 1724 iexplore.exe notepad.exe PID 1724 wrote to memory of 1664 1724 iexplore.exe notepad.exe PID 1724 wrote to memory of 1664 1724 iexplore.exe notepad.exe PID 1724 wrote to memory of 1664 1724 iexplore.exe notepad.exe PID 1724 wrote to memory of 1664 1724 iexplore.exe notepad.exe PID 1724 wrote to memory of 1664 1724 iexplore.exe notepad.exe PID 1724 wrote to memory of 1664 1724 iexplore.exe notepad.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 268 attrib.exe 588 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe"C:\Users\Admin\AppData\Local\Temp\bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742.exe" +s +h3⤵
- Views/modifies file attributes
PID:268 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Views/modifies file attributes
PID:588 -
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- Deletes itself
PID:2024 -
C:\Users\Admin\AppData\Roaming\nVidiaExpe\nvmdch.exe"C:\Users\Admin\AppData\Roaming\nVidiaExpe\nvmdch.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\notepad.exenotepad4⤵PID:1664
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\nVidiaExpe\nvmdch.exeMD5
42c4dc5105eff86f69d8c3d0d1e9e773
SHA1a4c1c4f627ac87cb180f3e70751bf525ef658def
SHA256bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742
SHA5128017b10da3f275a719dee0d7cdea1fc066af93a99748501d4d2519827f651d1dd7dbab5bab8f8ed268ef5cb72573c6f95a0e77e4e5e0af68a08a524feab8d91f
-
C:\Users\Admin\AppData\Roaming\nVidiaExpe\nvmdch.exeMD5
42c4dc5105eff86f69d8c3d0d1e9e773
SHA1a4c1c4f627ac87cb180f3e70751bf525ef658def
SHA256bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742
SHA5128017b10da3f275a719dee0d7cdea1fc066af93a99748501d4d2519827f651d1dd7dbab5bab8f8ed268ef5cb72573c6f95a0e77e4e5e0af68a08a524feab8d91f
-
\Users\Admin\AppData\Roaming\nVidiaExpe\nvmdch.exeMD5
42c4dc5105eff86f69d8c3d0d1e9e773
SHA1a4c1c4f627ac87cb180f3e70751bf525ef658def
SHA256bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742
SHA5128017b10da3f275a719dee0d7cdea1fc066af93a99748501d4d2519827f651d1dd7dbab5bab8f8ed268ef5cb72573c6f95a0e77e4e5e0af68a08a524feab8d91f
-
\Users\Admin\AppData\Roaming\nVidiaExpe\nvmdch.exeMD5
42c4dc5105eff86f69d8c3d0d1e9e773
SHA1a4c1c4f627ac87cb180f3e70751bf525ef658def
SHA256bcd956aebc76db25ef4891d1b85eaf7151dee287c61637d59aa7c071e258f742
SHA5128017b10da3f275a719dee0d7cdea1fc066af93a99748501d4d2519827f651d1dd7dbab5bab8f8ed268ef5cb72573c6f95a0e77e4e5e0af68a08a524feab8d91f
-
memory/268-6-0x0000000000000000-mapping.dmp
-
memory/588-5-0x0000000000000000-mapping.dmp
-
memory/1136-0-0x0000000000000000-mapping.dmp
-
memory/1332-1-0x0000000000000000-mapping.dmp
-
memory/1664-18-0x0000000000000000-mapping.dmp
-
memory/1664-17-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/1664-16-0x0000000000000000-mapping.dmp
-
memory/1724-12-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1724-13-0x00000000004B57C0-mapping.dmp
-
memory/1724-14-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1724-15-0x0000000000400000-0x00000000004B7000-memory.dmpFilesize
732KB
-
memory/1740-9-0x0000000000000000-mapping.dmp
-
memory/2024-3-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/2024-4-0x0000000000000000-mapping.dmp
-
memory/2024-2-0x0000000000000000-mapping.dmp