Analysis
-
max time kernel
48s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
07-05-2021 15:17
Static task
static1
Behavioral task
behavioral1
Sample
FB06EC887642C3C5C23FB43D9F81C93A.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
FB06EC887642C3C5C23FB43D9F81C93A.exe
Resource
win10v20210408
General
-
Target
FB06EC887642C3C5C23FB43D9F81C93A.exe
-
Size
268KB
-
MD5
fb06ec887642c3c5c23fb43d9f81c93a
-
SHA1
9fe8ef2fab3c34bd98fade711b8256e0511a1097
-
SHA256
d00184f7ae894b5bfd832771e9a920f9c399ba785e9a2f89382d499ec32e54a2
-
SHA512
7443dd4992cdfdfec37dac2deca8bc85539bede8e1de792b64b8a88d6c4d6c81301ce43dfc28bb8839d03881a9a948a7f5da616540db97442685a2ed391cc4dd
Malware Config
Extracted
fickerstealer
truzen.site:80
Extracted
cryptbot
eosbej52.top
morwxi05.top
Extracted
redline
MIX 07.05
xisolenoy.xyz:80
Signatures
-
CryptBot Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3924-130-0x0000000000400000-0x00000000008AF000-memory.dmp family_cryptbot behavioral2/memory/3924-129-0x00000000025E0000-0x00000000026C1000-memory.dmp family_cryptbot -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2296-151-0x00000000028A0000-0x00000000028BE000-memory.dmp family_redline behavioral2/memory/2296-155-0x0000000002A40000-0x0000000002A5D000-memory.dmp family_redline -
fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
Processes:
11403143534.exe11403143534.exe55982480256.exe32896488960.exeedspolishpp.exepid process 1096 11403143534.exe 412 11403143534.exe 3924 55982480256.exe 2664 32896488960.exe 2296 edspolishpp.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 21 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
11403143534.exedescription pid process target process PID 1096 set thread context of 412 1096 11403143534.exe 11403143534.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
11403143534.exe55982480256.exe32896488960.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 11403143534.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 11403143534.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 55982480256.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 55982480256.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 32896488960.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 32896488960.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2416 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 2480 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
11403143534.exeedspolishpp.exepid process 412 11403143534.exe 412 11403143534.exe 2296 edspolishpp.exe 2296 edspolishpp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
taskkill.exeedspolishpp.exedescription pid process Token: SeDebugPrivilege 2480 taskkill.exe Token: SeDebugPrivilege 2296 edspolishpp.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
55982480256.exepid process 3924 55982480256.exe 3924 55982480256.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
FB06EC887642C3C5C23FB43D9F81C93A.execmd.exe11403143534.execmd.execmd.execmd.exe32896488960.exe55982480256.execmd.exedescription pid process target process PID 1000 wrote to memory of 2020 1000 FB06EC887642C3C5C23FB43D9F81C93A.exe cmd.exe PID 1000 wrote to memory of 2020 1000 FB06EC887642C3C5C23FB43D9F81C93A.exe cmd.exe PID 1000 wrote to memory of 2020 1000 FB06EC887642C3C5C23FB43D9F81C93A.exe cmd.exe PID 2020 wrote to memory of 1096 2020 cmd.exe 11403143534.exe PID 2020 wrote to memory of 1096 2020 cmd.exe 11403143534.exe PID 2020 wrote to memory of 1096 2020 cmd.exe 11403143534.exe PID 1096 wrote to memory of 412 1096 11403143534.exe 11403143534.exe PID 1096 wrote to memory of 412 1096 11403143534.exe 11403143534.exe PID 1096 wrote to memory of 412 1096 11403143534.exe 11403143534.exe PID 1096 wrote to memory of 412 1096 11403143534.exe 11403143534.exe PID 1096 wrote to memory of 412 1096 11403143534.exe 11403143534.exe PID 1096 wrote to memory of 412 1096 11403143534.exe 11403143534.exe PID 1096 wrote to memory of 412 1096 11403143534.exe 11403143534.exe PID 1096 wrote to memory of 412 1096 11403143534.exe 11403143534.exe PID 1096 wrote to memory of 412 1096 11403143534.exe 11403143534.exe PID 1096 wrote to memory of 412 1096 11403143534.exe 11403143534.exe PID 1096 wrote to memory of 412 1096 11403143534.exe 11403143534.exe PID 1096 wrote to memory of 412 1096 11403143534.exe 11403143534.exe PID 1096 wrote to memory of 412 1096 11403143534.exe 11403143534.exe PID 1000 wrote to memory of 2112 1000 FB06EC887642C3C5C23FB43D9F81C93A.exe cmd.exe PID 1000 wrote to memory of 2112 1000 FB06EC887642C3C5C23FB43D9F81C93A.exe cmd.exe PID 1000 wrote to memory of 2112 1000 FB06EC887642C3C5C23FB43D9F81C93A.exe cmd.exe PID 2112 wrote to memory of 3924 2112 cmd.exe 55982480256.exe PID 2112 wrote to memory of 3924 2112 cmd.exe 55982480256.exe PID 2112 wrote to memory of 3924 2112 cmd.exe 55982480256.exe PID 1000 wrote to memory of 2396 1000 FB06EC887642C3C5C23FB43D9F81C93A.exe cmd.exe PID 1000 wrote to memory of 2396 1000 FB06EC887642C3C5C23FB43D9F81C93A.exe cmd.exe PID 1000 wrote to memory of 2396 1000 FB06EC887642C3C5C23FB43D9F81C93A.exe cmd.exe PID 2396 wrote to memory of 2664 2396 cmd.exe 32896488960.exe PID 2396 wrote to memory of 2664 2396 cmd.exe 32896488960.exe PID 2396 wrote to memory of 2664 2396 cmd.exe 32896488960.exe PID 1000 wrote to memory of 3620 1000 FB06EC887642C3C5C23FB43D9F81C93A.exe cmd.exe PID 1000 wrote to memory of 3620 1000 FB06EC887642C3C5C23FB43D9F81C93A.exe cmd.exe PID 1000 wrote to memory of 3620 1000 FB06EC887642C3C5C23FB43D9F81C93A.exe cmd.exe PID 3620 wrote to memory of 2480 3620 cmd.exe taskkill.exe PID 3620 wrote to memory of 2480 3620 cmd.exe taskkill.exe PID 3620 wrote to memory of 2480 3620 cmd.exe taskkill.exe PID 2664 wrote to memory of 2296 2664 32896488960.exe edspolishpp.exe PID 2664 wrote to memory of 2296 2664 32896488960.exe edspolishpp.exe PID 2664 wrote to memory of 2296 2664 32896488960.exe edspolishpp.exe PID 3924 wrote to memory of 2204 3924 55982480256.exe cmd.exe PID 3924 wrote to memory of 2204 3924 55982480256.exe cmd.exe PID 3924 wrote to memory of 2204 3924 55982480256.exe cmd.exe PID 2204 wrote to memory of 2416 2204 cmd.exe timeout.exe PID 2204 wrote to memory of 2416 2204 cmd.exe timeout.exe PID 2204 wrote to memory of 2416 2204 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FB06EC887642C3C5C23FB43D9F81C93A.exe"C:\Users\Admin\AppData\Local\Temp\FB06EC887642C3C5C23FB43D9F81C93A.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{I6Sr-cRGKB-Q88n-T8n1l}\11403143534.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{I6Sr-cRGKB-Q88n-T8n1l}\11403143534.exe"C:\Users\Admin\AppData\Local\Temp\{I6Sr-cRGKB-Q88n-T8n1l}\11403143534.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{I6Sr-cRGKB-Q88n-T8n1l}\11403143534.exe"C:\Users\Admin\AppData\Local\Temp\{I6Sr-cRGKB-Q88n-T8n1l}\11403143534.exe"4⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{I6Sr-cRGKB-Q88n-T8n1l}\55982480256.exe" /mix2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{I6Sr-cRGKB-Q88n-T8n1l}\55982480256.exe"C:\Users\Admin\AppData\Local\Temp\{I6Sr-cRGKB-Q88n-T8n1l}\55982480256.exe" /mix3⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\viunPVYHuQ & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{I6Sr-cRGKB-Q88n-T8n1l}\55982480256.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{I6Sr-cRGKB-Q88n-T8n1l}\32896488960.exe" /mix2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\{I6Sr-cRGKB-Q88n-T8n1l}\32896488960.exe"C:\Users\Admin\AppData\Local\Temp\{I6Sr-cRGKB-Q88n-T8n1l}\32896488960.exe" /mix3⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\nailedp\edspolishpp.exeedspolishpp.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "FB06EC887642C3C5C23FB43D9F81C93A.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\FB06EC887642C3C5C23FB43D9F81C93A.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im "FB06EC887642C3C5C23FB43D9F81C93A.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\viunPVYHuQ\HFCEDS~1.ZIPMD5
8ae460e87dfcc2ef5b523add13be0715
SHA17fe1b4f4b4741c47c5ea1e38e13ebb9dbf579355
SHA256f9b818aa2eeedf575ea67216c55c74fe267f17c061bd1d4d413aac396b982c5b
SHA5127c2d928d5f26e6692c0615616f8f4ca855564a1a25da3638967bf928c38d1088d9d4afc7d7462b6fdf05b518d927decd849bb4c568c431ad3fcacbea185d534d
-
C:\Users\Admin\AppData\Local\Temp\viunPVYHuQ\VMTZAP~1.ZIPMD5
7d4d9f158bc065ee241c6da58ec46124
SHA11ba40f8ff07aacd8ef360e77a0d263f926a6007c
SHA25647e8a84e9f75a81cd0879fba9c15cc6581f345b4f401fa7f1d0e9c444e95d950
SHA512c16c1efb16d78c0a77823beee776bd6d9198a412017dd57f565e975c4b73c1010a7f5546642855329fb25c40ba0a23b295053e76449251659fd1843720c30ca7
-
C:\Users\Admin\AppData\Local\Temp\viunPVYHuQ\_Files\_INFOR~1.TXTMD5
baadd1f0dcf8f6828e945265213ee0bf
SHA1c5c660a04a8bfc61fa922238ea475bcfa03c5f3a
SHA256cc03cc9a67df9769e2bdb396429acd4621e38be1c6587f801ab5b7a5eca3c4fa
SHA51239ab93c1baa300ac87c0b091beaf6d7c54183c88fe05ea867d1519c7c303cca781e7bdb1eb5117d5e9cd542d2404096f90fdaae28677da9b49bef96a534926e1
-
C:\Users\Admin\AppData\Local\Temp\viunPVYHuQ\_Files\_SCREE~1.JPEMD5
a4e871ce88f084fb7cb8f55938afedc2
SHA19928ee7c86e896093c6b9a9137c3201d73d80bcf
SHA256f362783534c38479fb08b7a56db32ad615c358f63e9a6599f437b4147076bf09
SHA512adbef62b86a98b9414979b526e5909ad0edd09cf63546d1cea0d95f022045aacbca18fa42a9c56f0094cc78b567b0f3fadc79d0fbf8b597ac8ca259e2eace56e
-
C:\Users\Admin\AppData\Local\Temp\viunPVYHuQ\files_\SCREEN~1.JPGMD5
a4e871ce88f084fb7cb8f55938afedc2
SHA19928ee7c86e896093c6b9a9137c3201d73d80bcf
SHA256f362783534c38479fb08b7a56db32ad615c358f63e9a6599f437b4147076bf09
SHA512adbef62b86a98b9414979b526e5909ad0edd09cf63546d1cea0d95f022045aacbca18fa42a9c56f0094cc78b567b0f3fadc79d0fbf8b597ac8ca259e2eace56e
-
C:\Users\Admin\AppData\Local\Temp\viunPVYHuQ\files_\SYSTEM~1.TXTMD5
08ce525f4e9a1b0101a90a7ad9e34e28
SHA10d39a2bdd3846c598efaf3895b6aa8cc9d0d4bef
SHA2560d4847dc2778b788ea787b1b662bb9f1345adecf84c359dc27642bda5abf1a3f
SHA512e018b39e94f54ff4b6540ee9fddeccdc9cbc30175ed44f1f52afdccf2e68a2df491fdb819d250b0edf9faea0362d4a8ea07a83925a4816ac90253608ca2cebe1
-
C:\Users\Admin\AppData\Local\Temp\{I6Sr-cRGKB-Q88n-T8n1l}\11403143534.exeMD5
9c23419a5813bde49026b7ffbb315e86
SHA19664a1d851e6a076228056dc3632b60917e78294
SHA256e9edd89f115b9d7fdd48092e43df7d58b74402b92ce7edadd049ea4b2b57aa1a
SHA512c695ee6ebd929287a407d9a2a36dfa9061ec3470c65690608be461f0dc62939461cf3e6405de82cb2daad96192b88d4e4dc8cae00e467516d6d0ec0c5b0c1023
-
C:\Users\Admin\AppData\Local\Temp\{I6Sr-cRGKB-Q88n-T8n1l}\11403143534.exeMD5
9c23419a5813bde49026b7ffbb315e86
SHA19664a1d851e6a076228056dc3632b60917e78294
SHA256e9edd89f115b9d7fdd48092e43df7d58b74402b92ce7edadd049ea4b2b57aa1a
SHA512c695ee6ebd929287a407d9a2a36dfa9061ec3470c65690608be461f0dc62939461cf3e6405de82cb2daad96192b88d4e4dc8cae00e467516d6d0ec0c5b0c1023
-
C:\Users\Admin\AppData\Local\Temp\{I6Sr-cRGKB-Q88n-T8n1l}\11403143534.exeMD5
9c23419a5813bde49026b7ffbb315e86
SHA19664a1d851e6a076228056dc3632b60917e78294
SHA256e9edd89f115b9d7fdd48092e43df7d58b74402b92ce7edadd049ea4b2b57aa1a
SHA512c695ee6ebd929287a407d9a2a36dfa9061ec3470c65690608be461f0dc62939461cf3e6405de82cb2daad96192b88d4e4dc8cae00e467516d6d0ec0c5b0c1023
-
C:\Users\Admin\AppData\Local\Temp\{I6Sr-cRGKB-Q88n-T8n1l}\32896488960.exeMD5
9479a5596e62700d1972206df64ad7dc
SHA1ba45ab9b18908f8fbafb1d372dba4b819363c5a5
SHA2568286090596289d3f8c6d26e9f048776c61737da6256b0b3e3fb72fa52ae2f9f3
SHA512238ffefb496a688515638aa8fc7840d7c1252d61271c4a075b8c98b3628ff67473d03f37fdd091311c57ed8160a85bd4b5a5cf656d45ed2b0196cf7947c46ce1
-
C:\Users\Admin\AppData\Local\Temp\{I6Sr-cRGKB-Q88n-T8n1l}\55982480256.exeMD5
7cae3416822ec2fa1a83a32d64f8f62d
SHA164b02f9cd5ba4d407b470878abf6e20350eac4e1
SHA256bae34b5431979a214eb8d112e79d305a8474eba7e46fb7470adc48f82010e5b7
SHA5127e44467f071992b798b18cfc705eb4df89712b57af8f026dcc10a1d752f08d385f4e73a53546941b82343bcf50db5c53ffe72f6aa3927d0f110a826c9afa36e6
-
C:\Users\Admin\AppData\Local\Temp\{I6Sr-cRGKB-Q88n-T8n1l}\55982480256.exeMD5
7cae3416822ec2fa1a83a32d64f8f62d
SHA164b02f9cd5ba4d407b470878abf6e20350eac4e1
SHA256bae34b5431979a214eb8d112e79d305a8474eba7e46fb7470adc48f82010e5b7
SHA5127e44467f071992b798b18cfc705eb4df89712b57af8f026dcc10a1d752f08d385f4e73a53546941b82343bcf50db5c53ffe72f6aa3927d0f110a826c9afa36e6
-
C:\Users\Admin\AppData\Roaming\nailedp\edspolishpp.exeMD5
5f3b587b0213ba0bfadae562d34f51fb
SHA1d2f879f6567c8d579f95f858185269d0f0879c63
SHA256f218fead84ca8d1c5063f776759cc9627cf6baff25bce94641ce4057c800ae52
SHA512a90368e0cf90bb2340de66ee29ab3aa686ca4362645dd336caa03123454d17a31b0bbabe117f443e655089ac2bd990204b8114964296fd351a6d86b8daf8e45d
-
C:\Users\Admin\AppData\Roaming\nailedp\edspolishpp.exeMD5
5f3b587b0213ba0bfadae562d34f51fb
SHA1d2f879f6567c8d579f95f858185269d0f0879c63
SHA256f218fead84ca8d1c5063f776759cc9627cf6baff25bce94641ce4057c800ae52
SHA512a90368e0cf90bb2340de66ee29ab3aa686ca4362645dd336caa03123454d17a31b0bbabe117f443e655089ac2bd990204b8114964296fd351a6d86b8daf8e45d
-
memory/412-120-0x0000000000400000-0x0000000000447000-memory.dmpFilesize
284KB
-
memory/412-121-0x0000000000401480-mapping.dmp
-
memory/412-124-0x0000000000400000-0x0000000000447000-memory.dmpFilesize
284KB
-
memory/1000-115-0x0000000000400000-0x0000000000455000-memory.dmpFilesize
340KB
-
memory/1000-114-0x00000000021B0000-0x00000000021DF000-memory.dmpFilesize
188KB
-
memory/1096-123-0x0000000002490000-0x00000000024D4000-memory.dmpFilesize
272KB
-
memory/1096-117-0x0000000000000000-mapping.dmp
-
memory/2020-116-0x0000000000000000-mapping.dmp
-
memory/2112-125-0x0000000000000000-mapping.dmp
-
memory/2204-143-0x0000000000000000-mapping.dmp
-
memory/2296-155-0x0000000002A40000-0x0000000002A5D000-memory.dmpFilesize
116KB
-
memory/2296-160-0x0000000005A00000-0x0000000005A01000-memory.dmpFilesize
4KB
-
memory/2296-166-0x0000000007120000-0x0000000007121000-memory.dmpFilesize
4KB
-
memory/2296-141-0x0000000002360000-0x0000000002390000-memory.dmpFilesize
192KB
-
memory/2296-142-0x0000000000400000-0x000000000085B000-memory.dmpFilesize
4.4MB
-
memory/2296-165-0x0000000006B10000-0x0000000006B11000-memory.dmpFilesize
4KB
-
memory/2296-164-0x0000000006900000-0x0000000006901000-memory.dmpFilesize
4KB
-
memory/2296-163-0x00000000064E0000-0x00000000064E1000-memory.dmpFilesize
4KB
-
memory/2296-162-0x0000000005B80000-0x0000000005B81000-memory.dmpFilesize
4KB
-
memory/2296-161-0x0000000004EA4000-0x0000000004EA6000-memory.dmpFilesize
8KB
-
memory/2296-138-0x0000000000000000-mapping.dmp
-
memory/2296-159-0x0000000004EA3000-0x0000000004EA4000-memory.dmpFilesize
4KB
-
memory/2296-158-0x00000000059C0000-0x00000000059C1000-memory.dmpFilesize
4KB
-
memory/2296-151-0x00000000028A0000-0x00000000028BE000-memory.dmpFilesize
120KB
-
memory/2296-153-0x0000000004EA2000-0x0000000004EA3000-memory.dmpFilesize
4KB
-
memory/2296-152-0x0000000004EA0000-0x0000000004EA1000-memory.dmpFilesize
4KB
-
memory/2296-154-0x0000000004EB0000-0x0000000004EB1000-memory.dmpFilesize
4KB
-
memory/2296-157-0x0000000004E50000-0x0000000004E51000-memory.dmpFilesize
4KB
-
memory/2296-156-0x00000000053B0000-0x00000000053B1000-memory.dmpFilesize
4KB
-
memory/2396-131-0x0000000000000000-mapping.dmp
-
memory/2416-150-0x0000000000000000-mapping.dmp
-
memory/2480-135-0x0000000000000000-mapping.dmp
-
memory/2664-132-0x0000000000000000-mapping.dmp
-
memory/2664-136-0x0000000002530000-0x00000000025FE000-memory.dmpFilesize
824KB
-
memory/2664-137-0x0000000000400000-0x00000000008A4000-memory.dmpFilesize
4.6MB
-
memory/3620-134-0x0000000000000000-mapping.dmp
-
memory/3924-126-0x0000000000000000-mapping.dmp
-
memory/3924-130-0x0000000000400000-0x00000000008AF000-memory.dmpFilesize
4.7MB
-
memory/3924-129-0x00000000025E0000-0x00000000026C1000-memory.dmpFilesize
900KB